-
Seven steps to designing and implementing Incident Response (IR) playbooks
Incident response playbooks are essential tools for SOC teams to effectively manage and mitigate cybersecurity threats.
-
The Pyramid of Pain
The goal of detecting indicators (IOCs and IOAs) is to identify and mitigate potential threats. If you respond quickly enough, you will deny the adversary the use of those indicators in attacking you.
-
Part II: Deploy NodeJS app from GitHub to Azure Web App using GitHub actions
In this section, we will focus on building and deploying our code to Azure web app using GitHub actions...
-
Part I: Deploy Static Web App from GitHub to Azure Static Web App
Azure App Service is an HTTP-based service for hosting web applications, REST APIs, and mobile back ends...
-
Traditional SIEM versus Next-Gen SIEM
A SIEM is a security solution comprising multiple technologies that works together to collect, store, analyze...
-
How to setup AWS account for local development
The administrator user will be used to manage your AWS account, so you want to assign all necessary permissions...
-
Five things to do to secure your AWS account
AWS strongly recommends that you do not use the root user for your everyday tasks...
-
Deploy to AWS S3 from GitLab CI/CD Pipeline
In this post, I will walk you through setting up AWS S3, OpenID Connect (OIDC), and GitLab CI/CD pipeline...
-
Serve multiple domains under one AWS CloudFront Distribution
Route "williamtopics.com" and its sub-domain "www.williamtopics.com" to the same resource ...
-
Thought Series: Can You Protect What You Cannot See?
Today’s organizations must invest in capabilities, programs, and tools that provide deep visibility ...
-
How to use Jekyll syntax highlighting
One thing to love about Jekyll is how flexible and configurable it can be, in the images above I used syntax highlighting to display code