IR 4: SEV Levels and MITRE ATT&CK

Introduction For a SOC, using structured frameworks like MITRE ATT&CK enhances incident detection and provides a clear methodology for tracking and understanding adversarial behavior. This post will cover the basics of operationalizing MITRE ATT&CK in a SOC environment and handling high severity incidents (SEV0). We’ll explore how MITRE ATT&CK improves Read more

CISSP 1: Equations

I have trouble remembering all of these, so I’m stashing them here. 1. Risk Management Equations 2. System Reliability and Maintenance Metrics 3. Cryptography and Access Control Calculations 4. Probability and Bayesian Analysis 5. Quantitative Risk Metrics 6. Binary and Boolean Logic Operations 1. Risk Management Equations Annualized Loss Expectancy Read more

Mastering Git

Git is more than just a tool for version control. It’s a core skill for any developer working in a collaborative environment. This guide will walk you through essential Git commands, concepts, and tips to make you effective in managing code and collaborating on projects. We’ll cover setup, basic operations, Read more

People first leadership

In today’s security landscape, the effectiveness of a cyber leader is defined not just by technical expertise but by their ability to support, empower, and protect their teams. By prioritizing a people first approach, these leaders create an environment where teams can focus on proactive defense, free from the hindrances Read more

VERIS

Introduction Accurate, structured incident data is essential for effective analysis, reporting, and response. VERIS (Vocabulary for Event Recording and Incident Sharing) provides a standardized approach to categorize security incidents, improving insights and facilitating data sharing. By utilizing VERIS, organizations can leverage it in ServiceNow to gain both strategic and tactical Read more