PinnedTristan DostalerWhere to start in Cybersecurity for new comersWhere to start in Cybersecurity — ContextMar 29, 2021Mar 29, 2021
PinnedTristan DostalerCIS controls — where to start in securing a medium/big enterpriseIn this post I’ll explain the CIS controls and how they can be used to start securing an enterprise.Jan 18, 20221Jan 18, 20221
PinnedTristan DostalerWhoamiPassionate about information security, development and technology in general, I like to share my experience with different technologies. I…Nov 20, 2020Nov 20, 2020
Tristan DostalerThe Rise of Ransomware: Unveiling the Secrets Behind Their SuccessUnderstanding the origins, history, and factors contributing to ransomware’s success is essential for anyone looking to protect themselves…Mar 27, 2023Mar 27, 2023
Tristan DostalerLeveraging ChatGPT in Cybersecurity: Enhancing Protection with AIThe landscape of cybersecurity has evolved significantly in recent years. As digital threats grow in complexity and scale, organizations…Mar 25, 2023Mar 25, 2023
Tristan DostalerHow to secure WordPressIn this post, I’ll explain different strategies that can be use to secure WordPress.Jun 4, 2022Jun 4, 2022
Tristan DostalerSIEM 103 — Detect Windows bruteforce part 2This post is a follow up of the post SIEM 102 — Detect Windows bruteforce where I explained how to create a detection Use Case to detect a…Jun 4, 2022Jun 4, 2022
Tristan DostalerWhy I switched from Logz.io to HumioI have posted a few articles about SIEMs and I have all done them using Logz.io for my examples. I recently switched to Humio and…Jan 28, 2022Jan 28, 2022
Tristan DostalerCybersecurity Books and References — A Good InfoSec Reading ListI have been asked a few times over the years for a good reading list of cybersecurity books and references to get to know more on the…Sep 29, 2021Sep 29, 2021