Skip to content
Quick Links
  • Blueprints
  • Documents
  • Events
  • Published Books
  • About Me
  • Video

MOBS Bangladesh

Meeting of Brilliant Syche – IT Pro's Corner

  • Home
  • Books
  • Events
  • Publications
  • Video
  • Documents
  • Blueprints
  • About Me

Day: July 29, 2025

Blue Team – Operational Activity in The Advanced SOC

July 29, 2025July 29, 2025 Shuvro

Reading Time: 3 minutesThe modern Security Operations Center (SOC) has evolved from a reactive, alert-centric cost center into a proactive, intelligence-driven hub for risk management.

Cybersecurity, MITRE, Security Operation Center, SIEM, SOAR, XDR

Red Team – Operational Activity in The Advanced SOC

July 29, 2025 Shuvro

Reading Time: 4 minutesThis blueprint provides a strategic framework for integrating intelligence-led Red Team operations into an advanced Security Operations Center (SOC).

Attack Simulation, Cybersecurity, NIST, OSINT, Security Operation Center, SOAR, SOC, Systems Security Engineering, XDR

Business Impact Analysis in the Enterprise

July 29, 2025July 29, 2025 Shuvro

Reading Time: 3 minutesThe Business Impact Analysis (BIA) is the foundational process for building enterprise resilience. It systematically predicts and quantifies the consequences of a disruption, enabling an organization to protect its most critical functions.

BCP - Business Continuity Plan, BIA - Business Impact Analysis, ISO/IEC 22301

Data Landscape of GenAI for Project Managers

July 29, 2025July 29, 2025 Shuvro

Reading Time: 4 minutesGenerative AI (GenAI) is fundamentally transforming project management from a discipline of administration into a function of strategic orchestration.

Data Governance, Data Lakehouse, Data Privacy, Data Protection, Data Quality, DSPM - Data Security Posture Management, GenAI, LLM - LArge Language Model, Project Management, RAG, Retrieval Augment Generation

Cloud Service Network Security (CSNS) in Your Enterprise

July 29, 2025July 29, 2025 Shuvro

Reading Time: 3 minutesThe enterprise migration to the cloud has dissolved the traditional security perimeter, demanding a fundamental shift in security strategy.

CIEM - Cloud Identity Entitlement Management, CNAPP - Cloud-Native Application Protection Platform, CSNS - Cloud Service Network Security, CSPM - Cloud Security Posture Management, CWPP - Cloud Workload Protection Platforms, Cybersecurity, SOC

CnAPP – Cloud-native Application Protection Platform for Your Enterprise

July 29, 2025 Shuvro

Reading Time: 4 minutesThe enterprise migration to the cloud has dissolved the traditional network perimeter, creating a complex and dynamic attack surface.

CDR - Cloud Detection and Response, CIEM - Cloud Identity Entitlement Management, CNAPP - Cloud-Native Application Protection Platform, CSPM - Cloud Security Posture Management, CVSS, DevOps, KSPM - Kubernetes Security Posture Management

Cloud Workload Protection Platforms

July 29, 2025 Shuvro

Reading Time: 3 minutesThis summary outlines the critical shift from isolated Cloud Workload Protection Platforms (CWPP) to integrated, full-stack Cloud-Native Application Protection Platforms (CNAPP)

CIEM - Cloud Identity Entitlement Management, CNAPP - Cloud-Native Application Protection Platform, CSPM - Cloud Security Posture Management, CWPP - Cloud Workload Protection Platforms, DSPM - Data Security Posture Management

Deep Dive into MITRE ATT&CK Vs. D3FEND Vs. RE&CT

July 29, 2025July 29, 2025 Shuvro

Reading Time: 3 minutesModern cybersecurity requires a shift from siloed, reactive functions to a proactive, integrated, and threat-informed defense.

Attack Simulation, CTI - Cyber Threat Intelligence, Cybersecurity, MITRE, TTP

Data Collection Methods for CTI

July 29, 2025July 29, 2025 Shuvro

Reading Time: 4 minutesAuthor: Shahab Al Yamin Chawdhury Date: July 26, 2024 Version: 1.0 (Summary) Executive Summary This blueprint provides a strategic methodology for designing and operationalizing a world-class Cyber Threat Intelligence (CTI) data collection program. It moves beyond simply listing sources to Read More …

CTI - Cyber Threat Intelligence, MITRE, SOAR, SOC, TTP, XTI - Extended Threat Intelligence

AI-Augmented SOC 3.0 for Your Enterprise

July 29, 2025July 29, 2025 Shuvro

Reading Time: 3 minutesThe traditional, human-centric Security Operations Center (SOC) is operationally and financially unsustainable. It is defined by a reactive “firefighting” model that cannot cope with the volume and sophistication of modern cyber threats.

AI - Artificial Intelligence, Cybersecurity, Data Lakehouse, Security Operation Center, SIEM, SOAR, SOC, Systems Security Engineering, UEBA, XDR

ISO 27031 – Implementation Roadmap

July 29, 2025 Shuvro

Reading Time: 3 minutesThis document provides a condensed, strategic roadmap for implementing ISO/IEC 27031 to establish a robust ICT Readiness for Business Continuity (IRBC) program.

BCP - Business Continuity Plan, Disaster Recovery, ISO/IEC 22301, ISO/IEC 27001, ISO/IEC 27031, PDCA

YouTube

http://www.youtube.com/user/shuvromcse

Categories

Monthly Archives

MOBS Calendar

July 2025
S M T W T F S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Jun   Aug »

Creative Commons

The opinions and views expressed in this blog are those of the author and do not necessarily state or reflect those of any vendor's regardless of hardware or software.

All contents is provided "AS IS" with zero warranties and warnings, and confers no rights. You assume all risk for your use.

All the Trademarks are the property rights of their respected owners.

NOTE: Please be aware I get lots of emails, and I cannot assist and fix everyone's problems. Also, please do not be offended if you do not get a response.

Testimonials

saranaHe is a proactive and tireless contributor who would make a great addition to any team. He is technologically very sound and I would highly recommend him for any technical position, as he naturally rises to the occasion when presented with something he is passionate about.

Sarana IslamBusiness DevelopmentOracleSingapore
TanzimShahab is an extra-ordinarily productive specialist on Microsoft’s server tool business. He is an exceptionally brilliant problem solver when it comes to designing solution architectures and developing infrastructures & deployment models.
Tanzim SaqibDeveloper EvangelistMicrosoft BangladeshDhaka, Bangladesh
I am working closely with Shahab for a little more than 3 years, and I know him both in  professional and personal capacity. Shahab amazed me with his integrity, trust, and unbelievable depth of Technological facts. I have never met anyone so competent in his/her profession. Shahab upgrades himself continually and I am so lucky to meet such a rare gentleman. He would be an asset to any organization who has engaged Shahab for his experience.
Ismail Jabih UllahHead, Org Development & TrainingLink3 Technologies Ltd. 
DeependraShahab have been hugely extending his hands to Nepal market support apart from his daily duty of Bangladesh Sub with his deeper knowledge in various Microsoft technology to many of our customer and is really adding value to Nepal business
Deependra BajracharyaPartner Sales ExecutiveMicrosoft NepalNepal
kanwarShahab, Your site is really fantastic. Contents compilation are awesome. Thank you very much for saving my time.
Khandaker AnwarAB Bank LimitedDhaka, Bangladesh
AhsanShahab is a thorough tech analyst who has made impact in Public Sector accounts while discussion went from opportunity creation to a maximization of technology utilization and value proposition.
Ahsan SharifPS DirectorMicrosoft BangladeshDhaka, Bangladesh
KennethShahab is a very detail person and constantly striving to help customers to achieve the best value.
Kenneth Ng Sin KwangTechnical SpecialistMicrosoft MalaysiaMalaysia

An extremely knowledgeable person in his field of work. He takes learning and applying new technology at work as a continuous process. A problem solver within a given period of time and cost. I wish him all the best.

Wahidur Rahman Khandkar
SabeelShahab is the most technically sound guy I ever had the opportunity of working with.
Sabeel RahmanAccount Manager, EPGMicrosoft BangladeshDhaka, Bangladesh

Twitter

Tweets by ShahabAlYaminCh

Most Viewed Posts

  • Events (2,177)
  • About Me (1,852)
  • Published Books (1,440)
  • A Proper Server & Device Naming Convention: Best Practices, Standard Naming Conventions, and Framework Requirements (1,438)
  • Blueprints (1,205)
Copyright mobs-bd.org. All rights reserved.
Proudly powered by WordPress | Education Hub by WEN Themes