About Sydni Williams-Shaw

This author has not yet filled in any details.
So far Sydni Williams-Shaw has created 25 blog entries.

From Theory to Practice: Testing Your Threat Hunting Hypotheses

Using threat hunting hypotheses to prevent security incidents From Theory to Practice: Testing Your Threat Hunting Hypotheses

12/19/2024

A threat hunting hypothesis refers to the proactive approach of seeking out potential threats within an organization’s network […]

By |2024-12-20T19:37:00+00:00December 19, 2024|Categories: Threat Hunting|

A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing

How each type of penetration testing works

A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing

12/13/2024

Taking the […]

By |2024-12-13T20:50:22+00:00December 13, 2024|Categories: Threat Hunting|

Adapting Penetration Testing Methods for Cloud Environments

Understand the specific threats in cloud environments

Adapting Penetration Testing Methods for Cloud Environments

11/20/2024

Penetration testing and security assessments face unique challenges in cloud environments. The traditional network perimeter has largely disappeared, with resources distributed […]

By |2024-11-12T22:07:48+00:00November 20, 2024|Categories: Threat Hunting|

Unlocking the Power of SIEM in Threat Hunting

Quicker, more effective threat detection and response with SIEM

Unlocking the Power of SIEM in Threat Hunting

11/06/2024

Analyzing security threats is a constant, ever-evolving job. Information from events and logging come in many different forms, […]

By |2024-11-06T18:13:29+00:00November 6, 2024|Categories: Threat Hunting|

Distinguishing Between Normal Network Behavior and Potential Cyber Threats

Tools to help spot a network threat 

Distinguishing Between Normal Network Behavior and Potential […]

By |2024-11-06T19:54:47+00:00October 23, 2024|Categories: Threat Hunting|

How to Implement the Zero Trust Model

How the model works and how to use it effectively

How to Implement the Zero Trust Model

10/07/2024

The Zero Trust Maturity Model operates on a simple principle: never trust, always verify. Instead […]

By |2024-09-25T20:08:41+00:00October 7, 2024|Categories: Cybersecurity Tools|

Four Intrusion Detection Methods for Countering Cyber Threats

An introduction into the four main detection methods

Four Intrusion Detection Methods for Countering Cyber Threats

09/17/2024

Intrusion detection methods are used to identify intruders that are trying to or have breached your network. There are […]

By |2024-09-25T16:40:03+00:00September 17, 2024|Categories: Threat Hunting|

Getting Started with Active Defense Tools

An approach focused on simplicity, scalability, and low cost

Getting Started with Active Defense Tools

09/05/2024

There is a lot of confusion around how to implement Active Defense tools. Part of the reason is because […]

By |2024-11-06T20:53:00+00:00September 5, 2024|Categories: Cybersecurity Tools|

Understanding the Business Impact of Active Defense Tools

What to consider when implementing Active Defense tools in your organization

Understanding the Business Impact of Active Defense Tools

08/28/2024

If your organization is grappling with whether or not to implement Active Defense tools to […]

By |2024-11-06T20:54:43+00:00August 28, 2024|Categories: Cybersecurity Tools|

Why Traditional Cyber Tools and Strategies Fail to Address the Threat of Intrusion

Examples of why traditional tools just aren’t enough in today’s cybersecurity climate

Why Traditional Cyber Tools and Strategies Fail to Address the Threat of Intrusion

08/21/2024

If […]

By |2024-08-26T21:52:51+00:00August 21, 2024|Categories: Cybersecurity Tools|

Leveraging Active Defense Tools to Protect Against Cyber Threats

The basics of Active Defense tools and how they work

Leveraging Active Defense Tools to Protect Against Cyber Threats

08/16/2024

When your network is compromised, your first priority is shutting down the intruder. While that might […]

By |2024-08-26T21:49:22+00:00August 16, 2024|Categories: Cybersecurity Tools|

Extending Your Vulnerability Scoring and Prioritization Beyond the CVSS

Consider a threat-based approach for vulnerability prioritization

Extending Your Vulnerability Scoring and Prioritization Beyond the CVSS

07/30/2024

The Common Vulnerability Scoring System (CVSS) certainly has its place in cyber security. In fact, it’s one of the […]

By |2024-08-26T21:45:42+00:00July 30, 2024|Categories: Vulnerability Management|
Go to Top