top of page
CYBERSOCURITY
DIARIES
GUIDE TO BUILDING
YOUR CYBERSECURITY RESILIENCE
![Socurity blog](https://static.wixstatic.com/media/31157d_33f0444a2cb84ee98d00d581df7520be~mv2.png/v1/crop/x_0,y_2,w_600,h_420/fill/w_523,h_371,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/SOC%20Blog%20feature_edited.png)
![](https://static.wixstatic.com/media/594687_93e5d1f69486471aa5d050ed8af6f781~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/594687_93e5d1f69486471aa5d050ed8af6f781~mv2.webp)
![Practical OSINT Strategies in Daily Cybersecurity](https://static.wixstatic.com/media/594687_93e5d1f69486471aa5d050ed8af6f781~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_auto/594687_93e5d1f69486471aa5d050ed8af6f781~mv2.webp)
Practical OSINT Strategies in Daily Cybersecurity
OSINT means Open-Source Intelligence which is an important skill for professionals. To understand what it means in the practical life we...
20
![Using Crowdstrike to ingest and correlate logs for Microsoft Entra (Azure AD)](https://static.wixstatic.com/media/af9495_cba940ea5fea49b19cb50853e128c4d0~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/af9495_cba940ea5fea49b19cb50853e128c4d0~mv2.webp)
Using Crowdstrike to ingest and correlate logs for Microsoft Entra (Azure AD)
for improved visibility and compliance with the NIS2 framework Nowadays cybersecurity and compliance with various intergovernmental...
28
![Why Do Cybercriminals Like Legacy Antivirus?](https://static.wixstatic.com/media/594687_33a08f234d0e48139d9b6620aa23f35e~mv2.png/v1/fill/w_207,h_177,fp_0.50_0.50,q_95,enc_auto/594687_33a08f234d0e48139d9b6620aa23f35e~mv2.webp)
Why Do Cybercriminals Like Legacy Antivirus?
Legacy antivirus (AV) is no longer capable of stopping adversaries. Modern endpoint security is required to stop breaches — period.
25
![Why Security Awareness Training is crucial?](https://static.wixstatic.com/media/594687_e73f4a0df2294648a25ac1dfe431672c~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/594687_e73f4a0df2294648a25ac1dfe431672c~mv2.webp)
Why Security Awareness Training is crucial?
Why do users need Security Education and why Proofpoint Security Awareness Training is better than others?
28
![Introducing our Vendors](https://static.wixstatic.com/media/594687_a72964b96b034d408f1bdc309aea2318~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/594687_a72964b96b034d408f1bdc309aea2318~mv2.webp)
Introducing our Vendors
As our colleagues often say: cybersecurity is like playing with LEGO bricks – you need to assemble systems block by block, which is both...
132
![Threat Hunting - in nutsh3ll](https://static.wixstatic.com/media/af9495_30b062ab959840df9f23ae0c6ed5e595~mv2.png/v1/fill/w_292,h_218,fp_0.50_0.50,q_95,enc_auto/af9495_30b062ab959840df9f23ae0c6ed5e595~mv2.webp)
Threat Hunting - in nutsh3ll
Prelude The purpose of this article is to give the reader the overview of a threat hunting method. Also how to fit threat hunting in SOC....
74
bottom of page