WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
The Log and Pony Show - Linux Logging and Instrumentation
The default logging for Linux systems is syslog. Syslog was developed in the 1980s by Eric Allman who developed the sendmail protocol. ...
The Log and Pony Show - Windows Logging (Instrumentation and Telemetry)
SOC Triad reference. ????pic???? Windows systems have been equipped with a robust logging system consisting of three main constructs:...
Data Center Operations
Data Centers are warehouse like buildings that seem to be being constructed all over the place. Data Centers house servers. Two of the...
Vulnerability Management - Scanning System Design for On-Premise Scanning
The importance of Scanner Location & Continuous Vulnerability Monitoring In vulnerability scanning, it's a fundamental requirement for...
SIEMs - FortiSIEM
FortSIEM has 4 main components: Collectors Workers Supervisor Backend Lg DB Events come from the log sources into the collectors. The...
Log and Pony Show - Log System Performance & Reliability
This blog post is going to discuss several aspects of the performance of your cyber security logging system. The logs need to be stored...
The Log and Pony Show - Cyber Security Logging and Sigma
Implementing and running effective security logging systems is a complex task that takes a lot of work and money. For the most part...
Managing Cybersecurity Logging Costs
Understanding SIEM Licensing There are several common SIEM licensing models, including: Events Per Second (EPS) Gigabytes per day (GBpd)...
Understanding the Log Journey from Source to SIEM
A primary challenge in centralized log collection lies in the intricacy of transporting logs from their source to the backend logging...
Security Logging and Information & Event Management (SIEM) systems - Costly Failures
Centralizing log collection within a Security Information and Event Management (SIEM) system is a crucial component of information...
Building and Managing Security Operations Centers (SOCs)
There is a cliché business term that references the success of an information technology goal, business, function, etc comes down to...
Cyber Threat Intelligence (CTI) - Quiz Questions
Names phases of the "Intelligence Cycle"? Identify the level of indicators in the Pyramid of Pain? Identify the aspects of the Diamond...
Cyber Threat Intelligence (CTI) - Analysis & Reporting
Here are some key points to consider about CTI reports: The availability of CTI reports is on the rise, and their quality is improving. In the past, subpar CTI reports often consisted primarily of a collection of technical CTI indicators, leading to the coining of the term "IOC" or "Indicator of Compromise." While IOCs remain a fundamental component of most CTI reports, modern reports go beyond this by offering in-depth analysis and contextual information. As an example, a re
Network Security Monitoring (NSM) - Zeek
Zeek (formerly known as Bro) is an open-source project conceived by Vern Paxson. Its roots trace back to its original incarnation as...
Champlain College Masters of Digital Forensics
I recently finished the Champlain College Masters of Digital Forensics program. I have a background in telecommunications and networking...
Top Five Books for On-The-Go Cyber Security Professionals
The Cuckoo's Egg - Cliff Stoll The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Paperback, 2005 (Audio available)...
Top Information Risk Books for Cyber Security Professionals
Measuring and Managing Information Risk: A FAIR Approach - Jack Freund and Jack Jones Measuring and Managing Information Risk: A FAIR...
Top Cyber Threat Intelligence (CTI) Books for Cyber Security Professionals
Intelligence-Driven Incident Response: Scott J. Roberts and Rebekah Brown Intelligence-Driven Incident Response: Outwitting the...
Top Business (Non-Finance) Books for Cyber Security Professionals
The Goal: A Business Graphic Novel - Eliyahu M. Goldratt , Dwight Jon Zimmerman The Goal: A Business Graphic Novel - 1984 (Audio...
























