4d ago · 18 min read · Let me be upfront about something before we get into this. I did not build this lab because someone told me to. I built it because I kept running into a wall. Every job description I read for SOC anal
Join discussion
Apr 15 · 3 min read · 1. Introduction: So You Need a SIEM. My Condolences. Let's get one thing straight. You're here because someone—a manager, an auditor, or that little voice of dread in your head—told you that you need a Security Information and Event Management (SIEM)...
Join discussionApr 5 · 2 min read · 1. Getting the logs into Splunk The task provided a web_activity.log file with HTTP requests grouped by internal IP addresses. My first step was to bring this data into Splunk so I could query and vis
Join discussion
Apr 5 · 6 min read · As part of a virtual cybersecurity experience with Commonwealth Bank, I completed a hands‑on fraud detection task using Splunk. The goal was to analyse a synthetic transaction dataset, build a dashboa
Join discussion
Apr 3 · 3 min read · Imagine sitting in a high-tech cockpit where every single light is flashing red, and every alarm is screaming at the same time. You know there is a genuine emergency somewhere in that chaos, but the s
Join discussion
Mar 9 · 13 min read · TL;DR Your security systems are designed for office networks. Remote workers operate on home WiFi, use personal devices, and access corporate networks through VPNs — a completely different threat surface. Traditional SIEMs (Security Information and E...
Join discussion