WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
The Cybersecurity Suri
In the realm of cybersecurity, there is also a 'Suri,' which is the abbreviation for Suricata. Suricata stands as an open-source,...
Vulnerability Management - Fragile Scanning
Certain devices are considered 'fragile' where aggressive vulnerability scanning could have a risk of impacting the availability of the...
Vulnerability Management - Tracking & Treating
In a previous article I highlighted a framework for vulnerability management program, developed by SANS instructors Jonathan Risto and...
Vulnerability Management - Vulnerability Prioritization
In a prior article, I introduced a vulnerability management program framework known as P.I.A.C.T., developed by SANS instructors Jonathan...
Management - Performance Goals
Managing people can be tough. One of the pillars of successful management is leading employees to meet the organizations objectives and...
Vulnerability Management - The Homonymy of "Scanning"
One of the most frequently used terms in cybersecurity is "Scanning." However, this term can encompass various meanings within the...
Cybersecurity Metrics
Metrics are the lifeblood of business decision-making, cherished by executives who rely on them to steer their organizations toward...
Vulnerability Management Program Overview
Let's face it, vulnerability management is a pain! In an online SANS article titled "Vulnerability Management Maturity Model Part I"...
Cyber Risk Concepts - Evaluating Security Controls
Security controls represent the foundational functions designed to enhance cybersecurity. For instance, a control may involve restricting...
Network Security Monitoring (NSM) - Hacker Command & Control (C&C) (C2)
Ralph Mudge developer of Cobalt Strike Red Team hacking software outlines from the hackers perspective 4 key processes that need to...
Cyber Risk Concepts - Why FAIR provides better analysis and References
The National Association of Corporate Directors (NACD) emphasizes the need for improved cyber risk information for boards. This includes...
Cyber Risk Concepts - Factor Analysis of Information Risk (FAIR)
Disclaimer - This article is just an a quick overview of a popular model for evaluating cybersecurity risk called Factor Analysis of...
Active Directory (AD) and Cyber Security
To begin dissecting Active Directory (AD), it's important to grasp the concept that a domain essentially constitutes a sizable collection...
Vulnerability Management - The Nagging Problems
Numerous organizations boast robust vulnerability management systems like Nessus, Rapid7, and Qualys, which excel in scanning systems for...
Elastic - Pricing
Elastic SaaS pricing is extensively documented. However, when researching the associated concepts, the abundance of information can...
SRE - Golden Signals Matrix
While overseeing Network Operations Centers (NOCs), I often noticed situations where systems were activated without adequate monitoring...
Networking - Spanning Tree
Spanning Tree Protocol (STP) was developed by Radia Perlman in the mid-eighties. STP was adopted as standard 802.1D. STP was developed...
Encrypted Traffic Analysis
Encrypted Traffic Overview - How Public Key Infrastructure (PKI) works RSA is a lynchpin of Public Key Cryptography. The more I learn...




























