Creating Google Docs programmatically — TablesWhen creating reports, you want to automate that, but how do you create a table within google documents?Nov 26Nov 26
Is data a currency?Using free services comes at a cost of sharing your (personal) data, does that make it a currency?Jul 29Jul 29
Mapping the cohesion between NIST CSF and MITRE DefendHow you can view and combine the power of NIST CSF and MITRE D3FEND to create a cohesive tactical & operational view on secops.Jun 27Jun 27
Ingesting CloudTrail to Elastic StackWith the usage of a cloud provider like AWS comes the requirement for Security Operations to keep track of activities performed by the…Dec 1, 2023Dec 1, 2023
Using ES|QL to detect non-compliant instances — pt3This is part 3, and the final part, in a series where are going through the steps ofNov 23, 2023Nov 23, 2023
Expanding Image builder to track valid AMI usage with Elastic — pt2In a previous post I setup AWS EC2 image builder to install Elastic Agent onto an AMI in such a way new instances will automatically…Nov 16, 2023Nov 16, 2023
Add Elastic Agent to your AWS AMI’s using EC2 Image BuilderWithin a security monitoring team one of the things you have to worry about is coverage, do all endpoints contain the required tools for…Nov 9, 2023Nov 9, 2023
Elastic security AI assistent — AWS BedrockWith the release of 8.11 Elastic introduced support for the Amazon Web Services Bedrock service, specifically the Claude and Claude…Nov 8, 20231Nov 8, 20231
Exploring Elastic CSPM (8.8)Exploring the CSPM integration from elastic and discovering how easy it is to setup, use and ultimatly fix your security posture.Jun 13, 2023Jun 13, 2023
Detecting new and inactive users using Elastic detectionsHave you ever needed the ability to detect a new user authenticating to your system or detect a user which has been dormant for a while…Oct 24, 2022Oct 24, 2022