#security
![cover](https://lopes.id/images/graphic-book-practical-thread-de.jpg)
Practical Threat Detection Engineering
Review of Practical Threat Detection Engineering book.
![cover](https://lopes.id/images/graphic-logo-google-chronicle.png)
Auto-Cleaning Lists in Chronicle SIEM
Automate list maintenance in Chronicle SIEM by removing expired entries.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-spider-netadmin.jpg)
Endpoint Security Reflections feat. EDR and EDR-like Tools
Exploring the pros and cons of EDR and alternative endpoint solutions.
![cover](https://lopes.id/images/graphic-logo-misp.png)
Integrating MISP with Chronicle SIEM
Streamline the integration between CTI and CSIRT in an automated and efficient way.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-myth-buster.jpg)
Debunking Threat Detection Myths
Challenging myths in threat detection analytics for enhanced security operations.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-finger-screen.jpg)
How to Sign Commits in Git(Hub)
Secure Git commits with cryptography and make your repositories more reliable.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-cooker-octopus.jpg)
Improving SecOps Beyond Tuning Analytics
![cover](https://lopes.id/images/photo-cliff-stoll.jpg)
The Cuckoo's Egg
A 1980s Infosec thriller with groundbreaking investigations.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-thinking-atop-building.jpg)
The Threat Detection Fundamental Dilemma
Exploring the dilemma in threat detection: Precision vs. Recall for analytics.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-robot-fixing-car.jpg)
A Little Hardening with Burp
How I used Burp to improve this blog's security.
![cover](https://lopes.id/images/graphic-logo-mitre-attack.jpg)
MITRE ATT&CK 101: Bridging the Gap
Guide to MITRE ATT&CK with history and context for better usage.
![cover](https://lopes.id/images/illustration-ai-compass-integrated-circuit.jpg)
Testing The Logfile Navigator
Exploring log analysis with lnav tool: challenges, insights, and tips.
![cover](https://lopes.id/images/graphic-logo-mitre-attack.jpg)
Getting Real About MITRE ATT&CK
Understanding MITRE ATT&CK and using it in your favor.
![cover](https://lopes.id/images/illustration-ai-watercolor-engineer-planning-house.jpg)
Insights into Effective SIEM Deployment
Strategies and tips for successful SIEM deployment.
Understanding Severity and Priority
Uncover optimal Detection Rule settings for consistent, efficient alerts.
![cover](https://lopes.id/images/graphic-book-intel-driven-ir.jpg)
Intelligence-Driven Incident Response
Discover how integrating CTI enhances Threat Detection and CSIRT.
![cover](https://lopes.id/images/graphic-logo-google-chronicle.png)
Chronicle SIEM: Insights and Challenges Explored
Features and challenges in a review centered around Threat Detection.
Effective Detection Rules for Net and Port Scans
Effective network and port scan detection.
Hardening Email with DKIM, SPF, DMARC
Learn how to protect your mailboxes from cyber threats.
Export and Decode GAuth 2FA Accounts
How to export and decode GAuth 2FA.
Using AWS Secrets Manager in Your Scripts
Learn to authenticate in tools seamlessly.
Updating Signed Documents with GPG
Update GPG signed documents, from key import to patching files in batch.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-air-defense-drones.jpg)
Automating Incident Response
Tackling log centralization, SIEM operationalization, and IR automation.
The Importance of Logging Strategy
Streamlined planning and retention practices for better logging.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-chess-red-blue.jpg)
Friction Between Red Teams and Incident Response
Avoidable friction between cybersecurity teams during Red Team exercises.
Query Security Services for IP Reputation
Query three security services in one shell script to check IP reputation.
Creating a Hardened Testing Environment
Install and harden Arch Linux to create a safer OS for network tests.
Secure and Easy Password and MFA Management
Manage your passwords and MFA tools to maximize security and usability.
![cover](https://lopes.id/images/graphic-logo-aws-security-specialty.jpg)
AWS Certified Security - Specialty Review
The materials and strategy I used to get this certification.
![cover](https://lopes.id/images/graphic-logo-isc2-cissp.png)
My Journey to CISSP Certification
My experience getting the CISSP certification.
![cover](https://lopes.id/images/graphic-logo-archlinux.png)
Linux Hardening with CIS Controls
Applying CIS controls for improving the security of an Arch Linux.
![cover](https://lopes.id/images/graphic-logo-archlinux.png)
Arch Linux Hardened Installation Guide
Step-by-step guide to perform a hardened Arch Linux installation.
![cover](https://lopes.id/images/graphic-logo-comptia-securityplus.png)
Certificação CompTIA Security+
Relato de como se preparar para a certificação S+ e dicas para estudos.