Every SOC team has a version of the same uncomfortable question sitting in the back of their mind: if an attacker used this technique right now, would we actually detect it? Most of the time, nobody has a clean answer. You have detection rules, you have a SIEM, you have a rough sense that your... Continue Reading →
CloudComply: Your Free Tool for ISM & ISO Compliance
A few weeks ago I completed the Claude Code in Action course from Anthropic. I said I'd share what I build with it. Here's the first one. Meet CloudComply - a free, open-source cloud compliance mapping tool that helps Australian organisations understand how AWS and Azure native services map against the Australian ISM (March 2026)... Continue Reading →
How I Built a Log Validation SOP for SIEM Using ACSC Standards (With a Reusable Template)
In a SOC, onboarding new log sources often leads to detection gaps due to incomplete or incorrect data, highlighting a process issue rather than a tooling one. The author developed a Log Validation Runbook aligned with ACSC standards to systematically assess log sources, ensuring compliance before production readiness. It includes a structured checklist addressing key areas like log format, required fields, and timestamp handling, ultimately aiding in consistent and effective log validation.
Cyber Security Career Options and Getting Started – Part 1
The field of cybersecurity has garnered significant attention, prompting many professionals from various industries and graduates to inquire about how they can enter this domain and explore the different career options it offers. To address these questions comprehensively, this blog series will be divided into two parts. In Part 1, we will delve into the... Continue Reading →
Top Breach and Attack Simulation Tools Reviewed
10 years ago, when Gartner defined SIEM (Security Information and Event Management) it was trending in the cybersecurity landscape, and every organization was looking for one. More players started coming in with different set of architecture and deployment based on organizations size and requirements. Even now there are new companies coming up with a new... Continue Reading →
How to secure your pc from Ransomware?
Ransomware attacks is on all-time high. Every week or month there is a new variant coming out. Cisco says that Ransomware attacks are growing more than 350 percent annually. If you are curious how ransomware spreads, I have answered for 'How does ransomware get on people's computers?' and how to avoid them in information security... Continue Reading →
CyberSec Talk Intro
Quick intro about this blog and what am I aiming to cover about.
