Alexander SinnoJan 6, 20232 min readMaximizing Efficiency with Automation: Reducing False Positives from Anomaly-Based DetectionMany technology providers are releasing new modules for anomaly based detections. This is a great step forward to widen our detection...
Alexander SinnoDec 31, 20222 min readUnlocking the Potential of Greece: A New Hub for Cyber Security CompaniesAround two years ago I started closely watching the developments of Greece as a potential Cyber Security hub through the lens of...
Alexander SinnoDec 27, 20226 min readUsing OpenAI to Optimize your SOCThe emergence of artificial intelligence from the platform OpenAI has shown some extremely promising results. We have done a presentation...
Alexander SinnoNov 29, 20224 min readThe Human Firewall EffectIn this blog we will discuss the effectiveness of the Human Firewall Effect. The concept is when you train your end-users to work as a...
Alexander SinnoNov 10, 202211 min readIncident Life-CycleThis post will explain how to generate a diagrammatic flow from log ingestion all the way to case and alert generation. It will also...
Alexander SinnoNov 10, 202211 min readIncident Classifications and Escalation PoliciesCreating incident classifications and building escalation policies around them is extremely important for playbook creation, triage,...