Articles by Him

TIBER-EU Framework

TIBER-EU Framework - Threat intelligence-based Red Teaming

Traffic Analysis with Windows Built-In Tools

Traffic Analysis with Windows Built-In Tools - Useful or not?

Cisco WebEx Online Meeting Security

Cisco WebEx Online Meeting Security - Securing Virtual Meetings

SANS SEC503 Intrusion Detection In-Depth

SANS SEC503 Intrusion Detection In-Depth

Detecting PPL Manipulation?

Detecting PPL Manipulation? – A Test using LSASS as an Example

Symmetric Encryption

Symmetric Encryption – An Introduction

Integrating the Cloud into Security

Integrating the Cloud into Security - or Security into the Cloud?

CIS CSAT

CIS CSAT - IT Security Assessment Tool

Asset Inventories

Asset Inventories – Making them sexy

Privileged Windows Accounts

Privileged Windows Accounts - The Concrete Danger of Critical Components

Sending Windows Firewall Logs to Graylog

Sending Windows Firewall Logs to Graylog – A Practical Guide

GDPR

GDPR - An IT Security Perspective

You want more?

Do you have any questions?

Our experts will get in contact with you!