PinnedTristan DostalerWhere to start in Cybersecurity for new comersWhere to start in Cybersecurity — Context12 min read·Mar 29, 2021----
PinnedTristan DostalerCIS controls — where to start in securing a medium/big enterpriseIn this post I’ll explain the CIS controls and how they can be used to start securing an enterprise.11 min read·Jan 18, 2022--1--1
PinnedTristan DostalerWhoamiPassionate about information security, development and technology in general, I like to share my experience with different technologies. I…2 min read·Nov 20, 2020----
Tristan DostalerThe Rise of Ransomware: Unveiling the Secrets Behind Their SuccessUnderstanding the origins, history, and factors contributing to ransomware’s success is essential for anyone looking to protect themselves…12 min read·Mar 27, 2023----
Tristan DostalerLeveraging ChatGPT in Cybersecurity: Enhancing Protection with AIThe landscape of cybersecurity has evolved significantly in recent years. As digital threats grow in complexity and scale, organizations…3 min read·Mar 25, 2023----
Tristan DostalerHow to secure WordPressIn this post, I’ll explain different strategies that can be use to secure WordPress.7 min read·Jun 4, 2022----
Tristan DostalerSIEM 103 — Detect Windows bruteforce part 2This post is a follow up of the post SIEM 102 — Detect Windows bruteforce where I explained how to create a detection Use Case to detect a…5 min read·Jun 4, 2022----
Tristan DostalerWhy I switched from Logz.io to HumioI have posted a few articles about SIEMs and I have all done them using Logz.io for my examples. I recently switched to Humio and…5 min read·Jan 28, 2022----
Tristan DostalerCybersecurity Books and References — A Good InfoSec Reading ListI have been asked a few times over the years for a good reading list of cybersecurity books and references to get to know more on the…6 min read·Sep 29, 2021----