#security

cover

Practical Threat Detection Engineering

Review of Practical Threat Detection Engineering book.

· 5min · Joe Lopes
Practical Threat Detection Engineering
cover

Auto-Cleaning Lists in Chronicle SIEM

Automate list maintenance in Chronicle SIEM by removing expired entries.

· 9min · Joe Lopes
Auto-Cleaning Lists in Chronicle SIEM
cover

Endpoint Security Reflections feat. EDR and EDR-like Tools

Exploring the pros and cons of EDR and alternative endpoint solutions.

· 8min · Joe Lopes
Endpoint Security Reflections feat. EDR and EDR-like Tools
cover

Integrating MISP with Chronicle SIEM

Streamline the integration between CTI and CSIRT in an automated and efficient way.

· 15min · Joe Lopes
Integrating MISP with Chronicle SIEM
cover

Debunking Threat Detection Myths

Challenging myths in threat detection analytics for enhanced security operations.

· 4min · Joe Lopes
Debunking Threat Detection Myths
cover

How to Sign Commits in Git(Hub)

Secure Git commits with cryptography and make your repositories more reliable.

· 4min · Joe Lopes
How to Sign Commits in Git(Hub)
cover

Improving SecOps Beyond Tuning Analytics

· 5min · Joe Lopes
Improving SecOps Beyond Tuning Analytics
cover

The Cuckoo's Egg

A 1980s Infosec thriller with groundbreaking investigations.

· 6min · Joe Lopes
The Cuckoo's Egg
cover

The Threat Detection Fundamental Dilemma

Exploring the dilemma in threat detection: Precision vs. Recall for analytics.

· 8min · Joe Lopes
The Threat Detection Fundamental Dilemma
cover

A Little Hardening with Burp

How I used Burp to improve this blog's security.

· 3min · Joe Lopes
A Little Hardening with Burp
cover

MITRE ATT&CK 101: Bridging the Gap

Guide to MITRE ATT&CK with history and context for better usage.

· 10min · Joe Lopes
MITRE ATT&CK 101: Bridging the Gap
cover

Testing The Logfile Navigator

Exploring log analysis with lnav tool: challenges, insights, and tips.

· 6min · Joe Lopes
Testing The Logfile Navigator
cover

Getting Real About MITRE ATT&CK

Understanding MITRE ATT&CK and using it in your favor.

· 4min · Joe Lopes
Getting Real About MITRE ATT&CK
cover

Insights into Effective SIEM Deployment

Strategies and tips for successful SIEM deployment.

· 8min · Joe Lopes
Insights into Effective SIEM Deployment

Understanding Severity and Priority

Uncover optimal Detection Rule settings for consistent, efficient alerts.

· 3min · Joe Lopes
Understanding Severity and Priority
cover

Intelligence-Driven Incident Response

Discover how integrating CTI enhances Threat Detection and CSIRT.

· 4min · Joe Lopes
Intelligence-Driven Incident Response
cover

Chronicle SIEM: Insights and Challenges Explored

Features and challenges in a review centered around Threat Detection.

· 12min · Joe Lopes
Chronicle SIEM: Insights and Challenges Explored

Effective Detection Rules for Net and Port Scans

Effective network and port scan detection.

· 7min · Joe Lopes
Effective Detection Rules for Net and Port Scans

Hardening Email with DKIM, SPF, DMARC

Learn how to protect your mailboxes from cyber threats.

· 5min · Joe Lopes
Hardening Email with DKIM, SPF, DMARC

Export and Decode GAuth 2FA Accounts

How to export and decode GAuth 2FA.

· 3min · Joe Lopes
Export and Decode GAuth 2FA Accounts

Using AWS Secrets Manager in Your Scripts

Learn to authenticate in tools seamlessly.

· 4min · Joe Lopes
Using AWS Secrets Manager in Your Scripts

Updating Signed Documents with GPG

Update GPG signed documents, from key import to patching files in batch.

· 4min · Joe Lopes
Updating Signed Documents with GPG
cover

Automating Incident Response

Tackling log centralization, SIEM operationalization, and IR automation.

· 9min · Joe Lopes
Automating Incident Response

The Importance of Logging Strategy

Streamlined planning and retention practices for better logging.

· 5min · Joe Lopes
The Importance of Logging Strategy
cover

Friction Between Red Teams and Incident Response

Avoidable friction between cybersecurity teams during Red Team exercises.

· 7min · Joe Lopes
Friction Between Red Teams and Incident Response

Query Security Services for IP Reputation

Query three security services in one shell script to check IP reputation.

· 4min · Joe Lopes
Query Security Services for IP Reputation

Creating a Hardened Testing Environment

Install and harden Arch Linux to create a safer OS for network tests.

· 3min · Joe Lopes
Creating a Hardened Testing Environment

Secure and Easy Password and MFA Management

Manage your passwords and MFA tools to maximize security and usability.

· 10min · Joe Lopes
Secure and Easy Password and MFA Management
cover

AWS Certified Security - Specialty Review

The materials and strategy I used to get this certification.

· 4min · Joe Lopes
AWS Certified Security - Specialty Review
cover

My Journey to CISSP Certification

My experience getting the CISSP certification.

· 17min · Joe Lopes
My Journey to CISSP Certification
cover

Linux Hardening with CIS Controls

Applying CIS controls for improving the security of an Arch Linux.

· 10min · Joe Lopes
Linux Hardening with CIS Controls
cover

Arch Linux Hardened Installation Guide

Step-by-step guide to perform a hardened Arch Linux installation.

· 11min · Joe Lopes
Arch Linux Hardened Installation Guide
cover

Certificação CompTIA Security+

Relato de como se preparar para a certificação S+ e dicas para estudos.

· 6min · Joe Lopes
Certificação CompTIA Security+