How I Built a Log Validation SOP for SIEM Using ACSC Standards (With a Reusable Template)

In a SOC, onboarding new log sources often leads to detection gaps due to incomplete or incorrect data, highlighting a process issue rather than a tooling one. The author developed a Log Validation Runbook aligned with ACSC standards to systematically assess log sources, ensuring compliance before production readiness. It includes a structured checklist addressing key areas like log format, required fields, and timestamp handling, ultimately aiding in consistent and effective log validation.

Top Breach and Attack Simulation Tools Reviewed

10 years ago, when Gartner defined SIEM (Security Information and Event Management) it was trending in the cybersecurity landscape, and every organization was looking for one. More players started coming in with different set of architecture and deployment based on organizations size and requirements. Even now there are new companies coming up with a new... Continue Reading →

How to secure your pc from Ransomware?

Ransomware attacks is on all-time high. Every week or month there is a new variant coming out. Cisco says that Ransomware attacks are growing more than 350 percent annually. If you are curious how ransomware spreads, I have answered for 'How does ransomware get on people's computers?' and how to avoid them in information security... Continue Reading →

Create a website or blog at WordPress.com

Up ↑