top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome

Zeek & Corelight - Core Packages

In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...

SOAR Notes

Automation Overview Identify and prioritize processes for automation: Begin with standard, repetitive tasks that can be easily automated,...

Incident Response (IR) Exercises

Incident Response (IR) Exercise Phases Establish Exercise Interval and Planning timelines: First, establish the IR exercise execution...

Elastic Security - Random Notes and Links

Elastic - Overview When considering data storage in Elasticsearch, it's common to think of relational databases. However, Elasticsearch...

Ransomware - Techniques - Encryption via GPUpdate

Ensuring the security of an organization's Domain Controller (DC) is paramount, recognizing it as a critical asset that must be protected...

The Cybersecurity Suri

In the realm of cybersecurity, there is also a 'Suri,' which is the abbreviation for Suricata. Suricata stands as an open-source,...

Vulnerability Management - Fragile Scanning

Certain devices are considered 'fragile' where aggressive vulnerability scanning could have a risk of impacting the availability of the...

Vulnerability Management - Tracking & Treating

In a previous article I highlighted a framework for vulnerability management program, developed by SANS instructors Jonathan Risto and...

Management - Performance Goals

Managing people can be tough. One of the pillars of successful management is leading employees to meet the organizations objectives and...

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page