About Sydni Williams-Shaw

This author has not yet filled in any details.
So far Sydni Williams-Shaw has created 28 blog entries.

How to Level Up Your Security Automation

Five Ways to Take Your Security Automation to the Next Level

How to Level Up Your Security Automation

03/28/2025

Security automation is no longer a nice-to-have—it’s a necessity. With cyber threats evolving at an alarming rate […]

By |2025-03-26T21:56:31+00:00March 28, 2025|Categories: Security Automation|

Signs You Need to Expand Your Security Automation Capabilities

Key indicators that it’s time to implement more robust capabilities Signs You Need to Expand Your Security Automation Capabilities

02/24/2025

The influx of security alerts and vulnerabilities in today’s environment finds many organizations stretched thin, trying […]

By |2025-03-26T17:26:22+00:00February 24, 2025|Categories: Security Automation|

Using a Threat-based Approach for Detections: Understanding Bad Actors

An effective strategy to detect threats in your environment

Using a Threat-based Approach for Detections: Understanding Bad Actors

01/15/2025

As a defender, a key to being successful is coming up with an effective strategy to detect […]

By |2025-01-27T17:15:50+00:00January 15, 2025|Categories: Threat Hunting|

From Theory to Practice: Testing Your Threat Hunting Hypotheses

Using threat hunting hypotheses to prevent security incidents From Theory to Practice: Testing Your Threat Hunting Hypotheses

12/19/2024

A threat hunting hypothesis refers to the proactive approach of seeking out potential threats within an organization’s network […]

By |2024-12-20T19:37:00+00:00December 19, 2024|Categories: Threat Hunting|

A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing

How each type of penetration testing works

A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing

12/13/2024

Taking the […]

By |2025-03-26T17:25:47+00:00December 13, 2024|Categories: Threat Hunting|

Adapting Penetration Testing Methods for Cloud Environments

Understand the specific threats in cloud environments

Adapting Penetration Testing Methods for Cloud Environments

11/20/2024

Penetration testing and security assessments face unique challenges in cloud environments. The traditional network perimeter has largely disappeared, with resources distributed […]

By |2024-11-12T22:07:48+00:00November 20, 2024|Categories: Threat Hunting|

Unlocking the Power of SIEM in Threat Hunting

Quicker, more effective threat detection and response with SIEM

Unlocking the Power of SIEM in Threat Hunting

11/06/2024

Analyzing security threats is a constant, ever-evolving job. Information from events and logging come in many different forms, […]

By |2024-11-06T18:13:29+00:00November 6, 2024|Categories: Threat Hunting|

Distinguishing Between Normal Network Behavior and Potential Cyber Threats

Tools to help spot a network threat 

Distinguishing Between Normal Network Behavior and Potential […]

By |2025-03-26T17:25:11+00:00October 23, 2024|Categories: Threat Hunting|

How to Implement the Zero Trust Model

How the model works and how to use it effectively

How to Implement the Zero Trust Model

10/07/2024

The Zero Trust Maturity Model operates on a simple principle: never trust, always verify. Instead […]

By |2024-09-25T20:08:41+00:00October 7, 2024|Categories: Cybersecurity Tools|

Four Intrusion Detection Methods for Countering Cyber Threats

An introduction into the four main detection methods

Four Intrusion Detection Methods for Countering Cyber Threats

09/17/2024

Intrusion detection methods are used to identify intruders that are trying to or have breached your network. There are […]

By |2024-09-25T16:40:03+00:00September 17, 2024|Categories: Threat Hunting|

Getting Started with Active Defense Tools

An approach focused on simplicity, scalability, and low cost

Getting Started with Active Defense Tools

09/05/2024

There is a lot of confusion around how to implement Active Defense tools. Part of the reason is because […]

By |2024-11-06T20:53:00+00:00September 5, 2024|Categories: Cybersecurity Tools|

Understanding the Business Impact of Active Defense Tools

What to consider when implementing Active Defense tools in your organization

Understanding the Business Impact of Active Defense Tools

08/28/2024

If your organization is grappling with whether or not to implement Active Defense tools to […]

By |2024-11-06T20:54:43+00:00August 28, 2024|Categories: Cybersecurity Tools|
Go to Top