WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Managing Cybersecurity Logging Costs
Understanding SIEM Licensing There are several common SIEM licensing models, including: Events Per Second (EPS) Gigabytes per day (GBpd)...
Understanding the Log Journey from Source to SIEM
A primary challenge in centralized log collection lies in the intricacy of transporting logs from their source to the backend logging...
Security Logging and Information & Event Management (SIEM) systems - Costly Failures
Centralizing log collection within a Security Information and Event Management (SIEM) system is a crucial component of information...
Building and Managing Security Operations Centers (SOCs)
There is a cliché business term that references the success of an information technology goal, business, function, etc comes down to...
Cyber Threat Intelligence (CTI) - Quiz Questions
Names phases of the "Intelligence Cycle"? Identify the level of indicators in the Pyramid of Pain? Identify the aspects of the Diamond...
Cyber Threat Intelligence (CTI) - Analysis & Reporting
Here are some key points to consider about CTI reports: The availability of CTI reports is on the rise, and their quality is improving....
Network Security Monitoring (NSM) - Zeek
Zeek (formerly known as Bro) is an open-source project conceived by Vern Paxson. Its roots trace back to its original incarnation as...
Champlain College Masters of Digital Forensics
I recently finished the Champlain College Masters of Digital Forensics program. I have a background in telecommunications and networking...
Top Five Books for On-The-Go Cyber Security Professionals
The Cuckoo's Egg - Cliff Stoll The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Paperback, 2005 (Audio available)...
Top Information Risk Books for Cyber Security Professionals
Measuring and Managing Information Risk: A FAIR Approach - Jack Freund and Jack Jones Measuring and Managing Information Risk: A FAIR...
Top Cyber Threat Intelligence (CTI) Books for Cyber Security Professionals
Intelligence-Driven Incident Response: Scott J. Roberts and Rebekah Brown Intelligence-Driven Incident Response: Outwitting the...
Top Business (Non-Finance) Books for Cyber Security Professionals
The Goal: A Business Graphic Novel - Eliyahu M. Goldratt , Dwight Jon Zimmerman The Goal: A Business Graphic Novel - 1984 (Audio...
Top Incident Response Books for Cyber Security Professionals
Adversarial Tradecraft in Cybersecurity - Dan Borges Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time...
Incident Response (IR) - Incident Response Frameworks & Plans
Incident Response (IR) Overview I view IR as a set of standardized blocks that you fit together to handle each incident uniquely. Some...
SOC Triad - Network Security Monitoring (NSM) & Network Detection Response (NDR)
In the realm of cybersecurity monitoring and response, an organization's effectiveness hinges on its proficiency across all facets of the...























