brencroninOct 274 min readSecurity Logging - Parent Events versus Base Events Parent Events versus Base Events Concept The diagram below highlights the SOC Triad, with core cybersecurity tools like Network Detection...
brencroninSep 82 min readElastic - Visualizations - Reusing Dashboards with controls and MarkdownsIf you have the same dashboard content you want to display across multiple similar but different items, it can be extremely cumbersome to...
brencroninMay 69 min readSOAR NotesAutomation Overview Identify and prioritize processes for automation: Begin with standard, repetitive tasks that can be easily automated,...
brencroninFeb 84 min readConnecting Logs to Identities in devices and ApplicationsAuthentication Logging for Operating Systems Overview One crucial aspect of cybersecurity involves monitoring logins associated with user...
brencroninDec 3, 20239 min readElastic Security - Random Notes and LinksElastic - Overview When considering data storage in Elasticsearch, it's common to think of relational databases. However, Elasticsearch...
brencroninNov 16, 202312 min readLogging Systems - Logging Ain't Easy But it's NecessaryNIST 800-53 logging controls are primarily categorized within the AU (Audit and Accountability) control family. Within AU, there are...
brencroninNov 15, 20235 min readCybersecurity Logging Systems - C.E.S 'Crowdstrike, Elastic, Splunk'In cybersecurity, various logging systems are employed, often known as 'Security Information & Event Management' (SIEM) systems when...