Published inInfoSec Write-upsSetting Up Your Azure OpenAI BYOD: A Step-by-Step GuideAzure OpenAI BYOD (Bring Your Own Data) empowers companies to utilize AI models like GPT-3.5, GPT-4, DALL-E, and Whisper for various…Feb 28, 2024311Feb 28, 2024311
Published inInfoSec Write-upsFrom Encryption to Decryption: LockBit Ransomware’s ShutdownTLDR: LockBit ransomware surfaced in 2019, posing a significant threat. However, recent collaborative efforts led by Europol and law…Feb 26, 20245Feb 26, 20245
Microsoft Azure Data Breaches Shake Cybersecurity Landscape — A Deep Dive into Two Consecutive…TLDR: Microsoft Azure experienced two significant data breaches within a span of two months in 2024, leading to widespread concern over…Feb 23, 202419Feb 23, 202419
Superquick deploy Elasticsearch on LinuxGuide to quick deploy Elastic Stack in Linux (CentoOS) environment.Oct 27, 20231Oct 27, 20231
Superquick deploy Elasticsearch using WSL+Docker DesktopElasticsearch a.k.a ELK (Elastic, Logstash and Kibaba) Stack is a popular opensource SIEM solution purpose-built to fulfil data and…Oct 25, 20239Oct 25, 20239
Working with Logic Apps in Microsoft SentinelAfter sinking tens of hours into creating new logic apps I am sharing my findings and knowledge so you can get ahead of the curve.Oct 19, 2023Oct 19, 2023
Published inInfoSec Write-upsSecurity Automation 101Who doesn’t love automation?Aug 9, 202315Aug 9, 202315
Platform Engineering — A New Era.TLDR; Those who design Internal Developer Platform (IDP)Jul 28, 202391Jul 28, 202391
Published inInfoSec Write-upsAzure Monitoring Tools You Must Know AboutAzure Monitor | Application Insights | Log Analytics | Microsoft SentinelJul 26, 202376Jul 26, 202376
Google Cybersecurity Professional Certificate — ReviewLet’s talk about the new defensive cybersecurity certificate, shall we?Jul 5, 20231281Jul 5, 20231281
Published inInfoSec Write-upsGetting Started with Azure DevOps CI/CD for Microsoft SentinelAutomate deployment of Security content in SentinelJun 26, 2023Jun 26, 2023
Imagine a world without Patents and CopyrightsWelcome to unlimited collaboration and progressJun 5, 2023Jun 5, 2023
Published inInfoSec Write-upsThreat Hunting in Security OperationsLet’s hunt!May 19, 20231May 19, 20231
Published inInfoSec Write-upsHave you heard about MITRE ATT&CK Enginuity Evaluation?Enginuity — A framework designed to test Endpoint Security products to their limits.Apr 28, 2023Apr 28, 2023
Published inInfoSec Write-upsI learned these priceless lessons in cybersecurity from my mentorsMentors are important in any domain, cybersecurity is no exception.Apr 11, 20231Apr 11, 20231
Published inTowards DevMicrosoft Security Copilot — AI-powered cyber defence!Microsoft upped the scales here.Mar 28, 2023Mar 28, 2023
How much money did I make from Medium till now?It’s enough to make me go... Yay!Feb 3, 20232Feb 3, 20232
Is Cybersecurity a Good Career?TL;DR: Indeed!Cybersecurity is a good career (period)Feb 1, 2023Feb 1, 2023