
Transforming search sentences to query Elastic SIEM with OpenAI API
In this blog post, we will explore how a powerful language model by OpenAI can automate the and bridge the gap between human language questions and SIEM query language.

Enforce Zero Trust in Microsoft 365 – Part 3: Introduction to Conditional Access
This blog post is the third blog post of a series dedicated to Zero Trust security in Microsoft 365. In…

Introducing CS2BR pt. I – How we enabled Brute Ratel Badgers to run Cobalt Strike BOFs
If you know all about CS, BRC4 and BOFs you might want to skip this introduction and get right into…

We’re celebrating our 10th anniversary!
From 5 people to almost 220 people. From working from our founders’ apartment to five offices in four countries. From…

Enforce Zero Trust in Microsoft 365 – Part 2: Protect against external users and applications
In the first blog post of this series, we have seen how strong authentication, i.e., Multi-Factor Authentication (MFA), could be…

Implementing Business Continuity on Azure
There is a general misconception among cloud consumers that the availability of their resources in the cloud is always guaranteed.…

Enforce Zero Trust in Microsoft 365 – Part 1: Setting the basics
This first blog post is part of a series of blog posts related to the implementation of Zero Trust approach…
Loading…
Something went wrong. Please refresh the page and/or try again.