J3bitokjebitok.hashnode.dev·Nov 11, 2024Cyber Defense Frameworks: Diamond Model (TryHackMe)In this article, I will write a Diamond Chain write-up: The Basics that covers Adversary, Victim, Capability, Infrastructure, Event Meta Features, Socio-Political Component, Technology Component, and Practice Analysis. What is the term for a person/...Discussdiamond-model
J3bitokjebitok.hashnode.dev·Nov 11, 2024Cyber Defense Frameworks: Unified Kill Chain (TryHackMe)In this article, I will write a Unified Kill Chain write-up: The Basics that covers What is a “Kill Chain”, What is “Threat Modelling”, Introducing the Unified Kill Chain, Phase: In (Initial Foothold), Phase: Through (Network Propagation), Phase: Out...Discuss#CyberDefense
J3bitokjebitok.hashnode.dev·Nov 9, 2024Cyber Defense Frameworks: SOC Level 1 (TryHackMe)In this article, I will write a Pyramid of Pain write-up: The Basics that covers Hash Values, IP Addresses, Domain Names, Host Artifacts, Network Artifacts, Tools, TTPs, and a Practical of the Pyramid of Pain. Analyse the report associated with the ...Discuss#CyberDefense
Shivain Sharmashivain.hashnode.dev·Nov 3, 2024Key Strategies for Digital Privacy: A Guide to Zero Trust ArchitectureEver wondered how companies are locking down sensitive data and keeping hackers at bay in today’s digital age? That’s where Zero Trust Architecture (ZTA) comes in—a revolutionary approach that’s reshaping how organizations protect their networks. Ins...Discuss·3 likesdigital privacy
Aboelhamd Abdellatifaboelhmd.com·Sep 30, 2024Introduction to Cybersecurity: Why It MattersIn today’s interconnected world, cybersecurity has become more critical than ever. As our lives become increasingly digital, the risks associated with cyber threats grow exponentially. This article explores the importance of cybersecurity, recent sta...DiscussSecurityInsights
YERRA VENKAT PRAVEEN MALLIKvenkatpraveens06.hashnode.dev·Aug 7, 2024How AI is Shaping the Future of CybersecurityArtificial Intelligence (AI) is revolutionizing cybersecurity by enhancing threat detection and response capabilities. Traditional methods often fall short against sophisticated cyber threats, but AI's ability to analyze vast amounts of data in real-...Discuss#cybersecurity