top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome

Zeek & Corelight - Core Packages

In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...

Incident Response (IR) Exercises

Incident Response (IR) Exercise Phases Establish Exercise Interval and Planning timelines: First, establish the IR exercise execution...

Elastic Security - Random Notes and Links

Elastic - Overview When considering data storage in Elasticsearch, it's common to think of relational databases. However, Elasticsearch...

The Cybersecurity Suri

In the realm of cybersecurity, there is also a 'Suri,' which is the abbreviation for Suricata. Suricata stands as an open-source,...

Vulnerability Management - Fragile Scanning

Certain devices are considered 'fragile' where aggressive vulnerability scanning could have a risk of impacting the availability of the...

Management - Performance Goals

Managing people can be tough. One of the pillars of successful management is leading employees to meet the organizations objectives and...

Cybersecurity Metrics

Metrics are the lifeblood of business decision-making, cherished by executives who rely on them to steer their organizations toward...

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page