User Endpoint Security In today’s world, endpoint security has become one of the most crucial aspects of safeguarding an organization’s infrastructure. With an increasing reliance on laptops and mobile devices to access sensitive information, ensuring the protection of these endpoints
Vulnerabilities – Scanning and Patching
The Power of Vulnerability Scanning and Patch Management: A Personal Approach As a security professional, I’ve had the opportunity to work with a variety of vulnerability scanners, both open-source and paid, and I’ve found that each tool offers unique advantages.
MISP and OpenCTI – Threat Intel
Enhancing Cyber Threat Intelligence: Automating IOC Ingestion into IDS-SIEM Systems In my latest project to strengthen an organization’s cybersecurity posture, I’ve been focusing on optimizing the collection, process, and integration of threat intelligence. The goal? Automating the ingestion of Indicators