Letās get straight to the point; security monitoring is the process of consuming data, analyzing it and detecting malicious activity, then handling that malicious activity. There are more factors at play that will influence some of your decisions:
[Read More]
Automating Security Monitoring - Part 1: Data
A look at how to get started automating security monitoring (or just stuff in general).
Lately Iāve been presenting a few times on the topic of automation and in particular for security monitoring to combat alert fatigue. One of the most important parts of this is the automation part. Itās not so much about security or security monitoring, but about teaching what automation is, what...
[Read More]
Christmas Wrappers - Part 2
How to create a wrapper script in Powershell
Following up on my latest post, Christmas Wrappers - Part 1, weāll be looking at how to expand our wrapper script in Powershell. In the last post we created a wrapper script for the MISP API. In this post weāll be adding functionality to the wrapper script.
[Read More]
Christmas Wrappers - Part 1
How to create a wrapper script in Powershell
One of my earliest posts was āBuilding a functionā. It was my attempt at teaching people to build a function in Powershell. Itās a bit outdated now, but I still think itās a decent read - however, the time has come to revisit the topic of Powershell-functions. This time, in...
[Read More]
Share your work!
How to get started sharing what you create and a book-review, of sorts.
Early on in my career I had this weird aversion for people who wrote blogs. Iām pretty sure at least part of it was a result of the nordic phenomenon called the Law of Jante, which can be summarized as a code of conduct used colloquially to denote a social...
[Read More]