top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome

Cyber Risk Concepts - CRISC certification - Part 1 - Governance

CRISQ Topic area overview Cyber risk management often feels complex due to the variety of frameworks, terminology, and implementation approaches in circulation. This article serves as a study aid for the Certified in Risk and Information Systems Control (CRISC) certification by breaking down key concepts within a simplified, practical risk management framework. At a high level, effective risk management can be distilled into four core functions: Risk Governance – Define the m

AI - In Security Operation Centers - Microsoft Defender

Security Copilot Product Testing These concepts are presented to establish a foundation for evaluating what Security Copilot can do today, the effort required to implement those capabilities, and how that may evolve with future enhancements. For instance, the transition from the Planning phase to Data Search may not yet be fully dynamic, particularly when the data required for analysis originates outside the Microsoft ecosystem. Microsoft has long incorporated guided response

Microsoft Certs - SC-100 - Overview

The Microsoft SC-100 'Microsoft Certified: Cybersecurity Architect Expert' credential is a Microsoft expert level credential that...

Identity Threat Concepts - Cookie Stealing Part 1

Understanding Identity in Transit vs. Identity at Rest: The Session Hijack Problem This article breaks down a key issue in modern identity protection: the critical difference between “Identity at Rest” and “Identity in Transit.” 1. Identity at Rest Identity at rest refers to credentials stored on systems or in databases, password hashes, key material, etc. Traditional attacks here include: Breaches targeting hashed credentials. Well-defined defenses exist for this space: Stro

AI Chip Wars

I recently came across a post about the Netherlands passing a stricter espionage law, explicitly extending to cyber activities, and it...

Key Cybersecurity Metric Concepts

The Importance, and Challenge of Cybersecurity Metrics Metrics are foundational to driving and refining business processes, and...

AI - Supply Chain - More on Gas Turbines

What Are Methane Turbines, and Why Are They in the AI Spotlight? Recent headlines about Elon Musk’s xAI "Colossus" data center in...

Microsoft SC200 - Sentinel SIEM/SOAR Part 5b - Analytics & Automations

Sentinel Detections and Automations In the previous section, we explored Workspace Manager, Data Connectors, and Settings. This section dives deeper into Sentinel's detection and response capabilities, focusing on: Analytics Watchlists Automation Configuration and settings for these features can also be found under the sentinel Configuration section. Sentinel Analytics (Detection Rules) Analytics rules are the core of Sentinel’s threat detection engine. These rules run querie

Microsoft SC200 - Sentinel SIEM/SOAR Part 5a - Overview & Data Injest

Microsoft Sentinel Overview SIEM, or Security Information and Event Management, is a security solution that helps organizations identify and respond to potential security threats by collecting, analyzing, and correlating security events and data from various sources. Sentinel is Microsoft SIEM product. Comparable products to Sentinel include: Splunk Elastic CrowdStrike Falcon scale Google SecOps Cortex XSIAM One of the things that is important for SIEMs to be successful is t

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page