Using a Threat-based Approach for Detections: Understanding Bad Actors Using a Threat-based Approach for Detections: Understanding Bad ActorsSydni Williams-Shaw2025-01-27T17:15:50+00:00January 15, 2025|Read More
From Theory to Practice: Testing Your Threat Hunting Hypotheses From Theory to Practice: Testing Your Threat Hunting HypothesesSydni Williams-Shaw2024-12-20T19:37:00+00:00December 19, 2024|Read More
A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing A Deep Dive into Black-Box, White-Box and Grey-Box Penetration TestingSydni Williams-Shaw2024-12-13T20:50:22+00:00December 13, 2024|Read More
Adapting Penetration Testing Methods for Cloud Environments Adapting Penetration Testing Methods for Cloud EnvironmentsSydni Williams-Shaw2024-11-12T22:07:48+00:00November 20, 2024|Read More
Unlocking the Power of SIEM in Threat Hunting Unlocking the Power of SIEM in Threat HuntingSydni Williams-Shaw2024-11-06T18:13:29+00:00November 6, 2024|Read More
Distinguishing Between Normal Network Behavior and Potential Cyber Threats Distinguishing Between Normal Network Behavior and Potential Cyber ThreatsSydni Williams-Shaw2024-11-06T19:54:47+00:00October 23, 2024|Read More
How to Implement the Zero Trust Model How to Implement the Zero Trust ModelSydni Williams-Shaw2024-09-25T20:08:41+00:00October 7, 2024|Read More
Four Intrusion Detection Methods for Countering Cyber Threats Four Intrusion Detection Methods for Countering Cyber ThreatsSydni Williams-Shaw2024-09-25T16:40:03+00:00September 17, 2024|Read More