recent publications

From a Log to the Threat Hunting

Post-quantum cryptography challenges for organizations

read
From a Log to the Threat Hunting

Security architecture: basic principles

read
From a Log to the Threat Hunting

Toward a Science of Cybersecurity

read
From a Log to the Threat Hunting

Methodology of Tabletop Exercises

read
Follina a silent Client-Side

Forgotten Protocols: IPMI

read
From a Log to the Threat Hunting

Design Thinking applied to Cybersecurity

read
From a Log to the Threat Hunting

Vulnerability Assessment

read
From a Log to the Threat Hunting

Introduction to the electromagnetic and radioelectric spectrum, how does it affect security?

read
From a Log to the Threat Hunting

OWASP Guide to APIs 2023

read
From a Log to the Threat Hunting

Purple teaming: Operations and Nuances

read
From a Log to the Threat Hunting

CVSSv4 and the pursuit of precision

read
From a Log to the Threat Hunting

Implementing effective controls in an ICS (ISO IEC 62443 standard)

read
From a Log to the Threat Hunting

Hypotheses in the field of cyber threat detection

read
Follina a silent Client-Side

Laboratory environment for offensive practices in industrial networks

read
From a Log to the Threat Hunting

Hypotheses in the field of cyber threat detection

read
From a Log to the Threat Hunting

The Shock wave of Data Breaches(The T-Mobile case)

read