In a SOC, onboarding new log sources often leads to detection gaps due to incomplete or incorrect data, highlighting a process issue rather than a tooling one. The author developed a Log Validation Runbook aligned with ACSC standards to systematically assess log sources, ensuring compliance before production readiness. It includes a structured checklist addressing key areas like log format, required fields, and timestamp handling, ultimately aiding in consistent and effective log validation.
Cyber Security Career Options and Getting Started – Part 1
The field of cybersecurity has garnered significant attention, prompting many professionals from various industries and graduates to inquire about how they can enter this domain and explore the different career options it offers. To address these questions comprehensively, this blog series will be divided into two parts. In Part 1, we will delve into the... Continue Reading →
Top Breach and Attack Simulation Tools Reviewed
10 years ago, when Gartner defined SIEM (Security Information and Event Management) it was trending in the cybersecurity landscape, and every organization was looking for one. More players started coming in with different set of architecture and deployment based on organizations size and requirements. Even now there are new companies coming up with a new... Continue Reading →
How to secure your pc from Ransomware?
Ransomware attacks is on all-time high. Every week or month there is a new variant coming out. Cisco says that Ransomware attacks are growing more than 350 percent annually. If you are curious how ransomware spreads, I have answered for 'How does ransomware get on people's computers?' and how to avoid them in information security... Continue Reading →
CyberSec Talk Intro
Quick intro about this blog and what am I aiming to cover about.
