X

You can join MEGA, the most secure cloud storage, with this referral link: https://mega.nz/aff=7Y94iYz_csg

  • Home
  • Patreon Login
  • All posts
  • Recent
  • Merch Store
  • Follow
  • Follow
  • Follow
  • Follow

How to secure WordPress

by Tristan Dostaler | Jun 4, 2022 | Cybersecurity, Information Technology, InfoSec, Private Posts

In this post, I explain different strategies that can be use to secure WordPress. I cover the basics, the plugins and more.

SIEM 103 — Detect Windows bruteforce part 2

by Tristan Dostaler | Jun 3, 2022 | DFIR, Information Technology, InfoSec, Private Posts, SIEM, SIEM 100 series

This post is a follow up of the post “SIEM 102 — Detect Windows bruteforce” where I explained how to create a detection Use Case to detect a Windows bruteforce.
In this post I will explain how we can enhance the original detection logic by having a lower False Positive rate.

Why I switched from Logz.io to Humio

by Tristan Dostaler | Jan 6, 2022 | Information Technology, InfoSec, Private Posts, SIEM

I recently switched to Humio and transferred all the logs and automations I have. In this post I explain why I did this transfer.

CIS controls – where to start in securing a medium/big enterprise

by Tristan Dostaler | Jan 4, 2022 | Cybersecurity, Information Technology, InfoSec, Private Posts

It’s hard to decide where to put the efforts to secure this environment. The 18 CIS Controls can help us prioritize our efforts.

The Log4j Vulnerability Explained

by Tristan Dostaler | Dec 23, 2021 | Cybersecurity, Information Technology, InfoSec, InfoSec News, TL;DR;

In this post I explain what is the story around the Log4j vulnerability, named Log4Shell, and why it’s on the news.

Cybersecurity Books and References – A Good InfoSec Reading List

by Tristan Dostaler | Jul 19, 2021 | Coding, Cybersecurity, Information Technology, InfoSec, Software Architecture

I have been asked for a reading list of cybersecurity books. I decided to document this list here so it can be used by a broader public.

NorthSec 2021 CTF write-up – part 2

by Tristan Dostaler | Jun 15, 2021 | CTF write-ups, Hack, Information Technology, InfoSec

If you didn't read it, I wrote a "part 1" which addresses easier challenges: https://www.tristandostaler.com/northsec-ctf-write-up-part-1/This post will be the part 2 of my write ups. Hymn This challenge was interesting for me because of my bias towards challenges of...

NorthSec 2021 CTF write-up – part 1

by Tristan Dostaler | May 29, 2021 | CTF write-ups, Hack, Information Technology, InfoSec

A first write-up for some NorthSec CTF’s challenges

Why MEGA is my favorite cloud storage provider

by Tristan Dostaler | Apr 8, 2021 | Information Technology, InfoSec

In this article I explain why MEGA is my favorite cloud storage provider. The main feature I like: they encrypt everything with your password!

Where to start in Cybersecurity for new comers

by Tristan Dostaler | Mar 28, 2021 | Cybersecurity, Information Technology, InfoSec

If you Google “Cybersecurity paths”, “Cybersecurity career” and other similar terms, you’ll find an array of results with all kind of advices all addressed at people already in the field. In this post, I’ll try to explain my take on this subject, but destined for new comers.

« Older Entries

MEGA referal

You can join MEGA, the most secure cloud storage, with this referral link: https://mega.nz/aff=7Y94iYz_csg

Recent Posts

  • How to secure WordPress
  • SIEM 103 — Detect Windows bruteforce part 2
  • Why I switched from Logz.io to Humio

Subscribe!

Support

Buy me a coffee

Follow Me

  • Twitter
  • Facebook
  • RSS Feed
  • Discord

Media and Support

  • Twitter
  • Facebook
  • RSS Feed
  • Discord
Buy me a coffee

Referal and Benefits

You can join MEGA, the most secure cloud storage, with this referral link: https://mega.nz/aff=7Y94iYz_csg

Recent posts

  • How to secure WordPress
  • SIEM 103 — Detect Windows bruteforce part 2
  • Why I switched from Logz.io to Humio
  • CIS controls – where to start in securing a medium/big enterprise
  • The Log4j Vulnerability Explained

Subscribe!

  • Privacy Policy