Published inInfoSec Write-upsSetting Up Your Azure OpenAI BYOD: A Step-by-Step GuideAzure OpenAI BYOD (Bring Your Own Data) empowers companies to utilize AI models like GPT-3.5, GPT-4, DALL-E, and Whisper for various…Feb 28, 20241Feb 28, 20241
Published inInfoSec Write-upsFrom Encryption to Decryption: LockBit Ransomware’s ShutdownTLDR: LockBit ransomware surfaced in 2019, posing a significant threat. However, recent collaborative efforts led by Europol and law…Feb 26, 2024Feb 26, 2024
Microsoft Azure Data Breaches Shake Cybersecurity Landscape — A Deep Dive into Two Consecutive…TLDR: Microsoft Azure experienced two significant data breaches within a span of two months in 2024, leading to widespread concern over…Feb 23, 2024Feb 23, 2024
Superquick deploy Elasticsearch on LinuxGuide to quick deploy Elastic Stack in Linux (CentoOS) environment.Oct 27, 2023Oct 27, 2023
Superquick deploy Elasticsearch using WSL+Docker DesktopElasticsearch a.k.a ELK (Elastic, Logstash and Kibaba) Stack is a popular opensource SIEM solution purpose-built to fulfil data and…Oct 25, 2023Oct 25, 2023
Working with Logic Apps in Microsoft SentinelAfter sinking tens of hours into creating new logic apps I am sharing my findings and knowledge so you can get ahead of the curve.Oct 19, 2023Oct 19, 2023
Published inInfoSec Write-upsSecurity Automation 101Who doesn’t love automation?Aug 9, 2023Aug 9, 2023
Platform Engineering — A New Era.TLDR; Those who design Internal Developer Platform (IDP)Jul 28, 20231Jul 28, 20231
Published inInfoSec Write-upsAzure Monitoring Tools You Must Know AboutAzure Monitor | Application Insights | Log Analytics | Microsoft SentinelJul 26, 2023Jul 26, 2023
Google Cybersecurity Professional Certificate — ReviewLet’s talk about the new defensive cybersecurity certificate, shall we?Jul 5, 20231Jul 5, 20231