The Power of Vulnerability Scanning and Patch Management: A Personal Approach As a security professional, I’ve had the opportunity to work with a variety of vulnerability scanners, both open-source and paid, and I’ve found that each tool offers unique advantages.
MISP and OpenCTI – Threat Intel
Enhancing Cyber Threat Intelligence: Automating IOC Ingestion into IDS-SIEM Systems In my latest project to strengthen an organization’s cybersecurity posture, I’ve been focusing on optimizing the collection, process, and integration of threat intelligence. The goal? Automating the ingestion of Indicators