WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Cyber Risk Concepts - Evaluating Security Controls
Security controls represent the foundational functions designed to enhance cybersecurity. For instance, a control may involve restricting...
Network Security Monitoring (NSM) - Hacker Command & Control (C&C) (C2)
Ralph Mudge developer of Cobalt Strike Red Team hacking software outlines from the hackers perspective 4 key processes that need to...
Cyber Risk Concepts - Why FAIR provides better analysis and References
The National Association of Corporate Directors (NACD) emphasizes the need for improved cyber risk information for boards. This includes...
Cyber Risk Concepts - Factor Analysis of Information Risk (FAIR)
Disclaimer - This article is just an a quick overview of a popular model for evaluating cybersecurity risk called Factor Analysis of...
Active Directory (AD) and Cyber Security
To begin dissecting Active Directory (AD), it's important to grasp the concept that a domain essentially constitutes a sizable collection...
Vulnerability Management - The Nagging Problems
Numerous organizations boast robust vulnerability management systems like Nessus, Rapid7, and Qualys, which excel in scanning systems for...
Elastic - Pricing
Elastic SaaS pricing is extensively documented. However, when researching the associated concepts, the abundance of information can...
SRE - Golden Signals Matrix
While overseeing Network Operations Centers (NOCs), I often noticed situations where systems were activated without adequate monitoring...
Networking - Spanning Tree
Spanning Tree Protocol (STP) was developed by Radia Perlman in the mid-eighties. STP was adopted as standard 802.1D. STP was developed...
Encrypted Traffic Analysis
Encrypted Traffic Overview - How Public Key Infrastructure (PKI) works RSA is a lynchpin of Public Key Cryptography. The more I learn...
Cyber Defense/Game Strategy Analogy
If you are playing a team sport you can be fantastic at a single area, but still lose. For example, if you have great goal scorers and a...
Email Analysis - Understanding Email Header Analysis including SPF, DKIM, and DMARC
Why is Email Analysis needed Phishing emails persist as one of the primary attack vectors targeting organizations. The Mitre ATT&CK...
The Log and Pony Show - Security Orchestration Automation Response (SOAR)
SOCs typically revolve around watching/monitoring the Security Information & Event Management (SIEM) system as a single pane of glass for...
The Log and Pony Show - Linux Logging and Instrumentation
The default logging for Linux systems is syslog. Syslog was developed in the 1980s by Eric Allman who developed the sendmail protocol. ...
The Log and Pony Show - Windows Logging (Instrumentation and Telemetry)
SOC Triad reference. ????pic???? Windows systems have been equipped with a robust logging system consisting of three main constructs:...
Data Center Operations
Data Centers are warehouse like buildings that seem to be being constructed all over the place. Data Centers house servers. Two of the...
Vulnerability Management - Scanning System Design for On-Premise Scanning
The importance of Scanner Location & Continuous Vulnerability Monitoring In vulnerability scanning, it's a fundamental requirement for...
SIEMs - FortiSIEM
FortSIEM has 4 main components: Collectors Workers Supervisor Backend Lg DB Events come from the log sources into the collectors. The...
Log and Pony Show - Log System Performance & Reliability
This blog post is going to discuss several aspects of the performance of your cyber security logging system. The logs need to be stored...




























