WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Email Analysis - Understanding Email Header Analysis including SPF, DKIM, and DMARC
Why is Email Analysis needed Phishing emails persist as one of the primary attack vectors targeting organizations. The Mitre ATT&CK...
The Log and Pony Show - Security Orchestration Automation Response (SOAR)
SOCs typically revolve around watching/monitoring the Security Information & Event Management (SIEM) system as a single pane of glass for...
The Log and Pony Show - Linux Logging and Instrumentation
The default logging for Linux systems is syslog. Syslog was developed in the 1980s by Eric Allman who developed the sendmail protocol. ...
The Log and Pony Show - Windows Logging (Instrumentation and Telemetry)
SOC Triad reference. ????pic???? Windows systems have been equipped with a robust logging system consisting of three main constructs:...
Data Center Operations
Data Centers are warehouse like buildings that seem to be being constructed all over the place. Data Centers house servers. Two of the...
Vulnerability Management - Scanning System Design for On-Premise Scanning
The importance of Scanner Location & Continuous Vulnerability Monitoring In vulnerability scanning, it's a fundamental requirement for...
SIEMs - FortiSIEM
FortSIEM has 4 main components: Collectors Workers Supervisor Backend Lg DB Events come from the log sources into the collectors. The...
Log and Pony Show - Log System Performance & Reliability
This blog post is going to discuss several aspects of the performance of your cyber security logging system. The logs need to be stored...
The Log and Pony Show - Cyber Security Logging and Sigma
Implementing and running effective security logging systems is a complex task that takes a lot of work and money. For the most part...
Managing Cybersecurity Logging Costs
Understanding SIEM Licensing There are several common SIEM licensing models, including: Events Per Second (EPS) Gigabytes per day (GBpd)...
Understanding the Log Journey from Source to SIEM
A primary challenge in centralized log collection lies in the intricacy of transporting logs from their source to the backend logging...
Security Logging and Information & Event Management (SIEM) systems - Costly Failures
Centralizing log collection within a Security Information and Event Management (SIEM) system is a crucial component of information...
Building and Managing Security Operations Centers (SOCs)
There is a cliché business term that references the success of an information technology goal, business, function, etc comes down to...
Cyber Threat Intelligence (CTI) - Quiz Questions
Names phases of the "Intelligence Cycle"? Identify the level of indicators in the Pyramid of Pain? Identify the aspects of the Diamond...
Cyber Threat Intelligence (CTI) - Analysis & Reporting
Here are some key points to consider about CTI reports: The availability of CTI reports is on the rise, and their quality is improving....
Network Security Monitoring (NSM) - Zeek
Zeek (formerly known as Bro) is an open-source project conceived by Vern Paxson. Its roots trace back to its original incarnation as...
Champlain College Masters of Digital Forensics
I recently finished the Champlain College Masters of Digital Forensics program. I have a background in telecommunications and networking...
Top Five Books for On-The-Go Cyber Security Professionals
The Cuckoo's Egg - Cliff Stoll The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Paperback, 2005 (Audio available)...
Top Information Risk Books for Cyber Security Professionals
Measuring and Managing Information Risk: A FAIR Approach - Jack Freund and Jack Jones Measuring and Managing Information Risk: A FAIR...



























