Blog on SecurityBLOG ON SECURITY
  • About this blog
Sign in Subscribe
How to boost agile DevSecOps
agile cybersecurity

How to boost agile DevSecOps

Find out why true agility goes deeper than process and how a cultural shift built on trust, communication and shared responsibility is your best chance at delivering real DevSecOps success
Read More
Staff
What is lean cybersecurity
lean cybersecurity

What is lean cybersecurity

Discover lean cybersecurity and how it can help teams reduce waste and deliver high-impact results
Read More
Staff
Jira for SecOps: three easy ideas to get started
cybersecurity automation

Jira for SecOps: three easy ideas to get started

Accelerate the adoption of Jira for your security operations while avoiding common pitfalls
Read More
Staff
AI pentest report analysis - part one: designing an agentic solution
agentic cybersecurity

AI pentest report analysis - part one: designing an agentic solution

Slash pentest report analysis time (and costs) with smart AI agents that do all the heavy lifting
Read More
Staff
ISMS open source challenges
free isms

ISMS open source challenges

There are many challenges in building an open source ISMS. Find out what these are and how to handle them
Read More
Staff
The impact of new power geopolitics on cybersecurity: how can lean teams react
ciso skills

The impact of new power geopolitics on cybersecurity: how can lean teams react

Navigating cybersecurity amidst rapid geopolitical shifts: strategies for lean teams
Read More
Staff
Scenario-based threat management
lean cybersecurity

Scenario-based threat management

Cut out the noise, address what matters and efficiently manage threats using lean, scenario-based approaches
Read More
Staff
Running lean management reviews
ciso skills

Running lean management reviews

Get leadership's full attention with lean cybersecurity management reviews that respect everyone's time
Read More
Staff
Build an Azure Sentinel lab - part four: free endpoint detection with Sysmon
azure sentinel labs

Build an Azure Sentinel lab - part four: free endpoint detection with Sysmon

Learn how to build a free endpoint detection capability using Sysmon and Mitre ATT&CK
Read More
Staff
Agile security operations: three easy ideas to get started
agile cybersecurity

Agile security operations: three easy ideas to get started

A look at three simple ideas to ease your team into agile security operations
Read More
Staff
Build an Azure Sentinel lab - part three: deploying a domain controller using Bicep
azure sentinel labs

Build an Azure Sentinel lab - part three: deploying a domain controller using Bicep

Learn how to automatically deploy a domain controller within your Azure Sentinel lab
Read More
Staff
Cybersecurity budgeting basics
ciso skills

Cybersecurity budgeting basics

Learn how to build a budget that your CFO and management board can understand
Read More
Staff
Blog on Security © 2025
  • Subscribe
  • Privacy policy
  • Edoardo Gerosa
Powered by Ghost