AI vs. Automation in Security Operations: Determining When to Use What AI vs. Automation in Security Operations: Determining When to Use WhatSydni Williams-Shaw2025-05-28T18:38:17+00:00April 26, 2025|Read More
How to Level Up Your Security Automation How to Level Up Your Security AutomationSydni Williams-Shaw2025-03-26T21:56:31+00:00March 28, 2025|Read More
Signs You Need to Expand Your Security Automation Capabilities Signs You Need to Expand Your Security Automation CapabilitiesSydni Williams-Shaw2025-03-26T17:26:22+00:00February 24, 2025|Read More
Using a Threat-based Approach for Detections: Understanding Bad Actors Using a Threat-based Approach for Detections: Understanding Bad ActorsSydni Williams-Shaw2025-01-27T17:15:50+00:00January 15, 2025|Read More
From Theory to Practice: Testing Your Threat Hunting Hypotheses From Theory to Practice: Testing Your Threat Hunting HypothesesSydni Williams-Shaw2024-12-20T19:37:00+00:00December 19, 2024|Read More
A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing A Deep Dive into Black-Box, White-Box and Grey-Box Penetration TestingSydni Williams-Shaw2025-03-26T17:25:47+00:00December 13, 2024|Read More
Adapting Penetration Testing Methods for Cloud Environments Adapting Penetration Testing Methods for Cloud EnvironmentsSydni Williams-Shaw2024-11-12T22:07:48+00:00November 20, 2024|Read More
Unlocking the Power of SIEM in Threat Hunting Unlocking the Power of SIEM in Threat HuntingSydni Williams-Shaw2024-11-06T18:13:29+00:00November 6, 2024|Read More