InDetect FYIbyAlex TeixeiraHow to prioritize a Detection Backlog?I started writing Medium stories in 2017 and the very first article was "How to rank Quick Wins", a fascinating topic that deserved another…May 13, 20247May 13, 20247
InInfoSec Write-upsbyAdam GossMalware Analysis Lab EnvironmentSetting up a malware analysis lab environment using Proxmox, REMnux, and Flare-VMApr 29, 20221Apr 29, 20221
InInfoSec Write-upsbyPierre NoujeimAutomated Incident Response to Initial Access: Valid AccountsAs organizations seek to bolster their cyber defense strategies, the MITRE ATT&CK framework has emerged as a valuable resource for…May 18, 2023May 18, 2023
InDetect FYIbyAlex TeixeiraFive lessons I learned from building anomaly-based threat detectionThis is a short one for inspiring those planning or already adventuring with anomaly detection as part of their use cases backlog.Aug 30, 20232Aug 30, 20232