Wazuh, Beats, CheckMK, Open UBA, Open XDR, OpenCTI, Suricata, MISP, Snort, TheHive, Cortex, ELK, AlertAnalyst – and More Integration is Required…Does it Makes Sense?

Reading Time: 3 minutesThe decision to build a security platform from open-source components is conditional.

Auditor Became CISSP – Never Performed in Projects & in IS Development, Would You Hire Him for Your Infrastructure Platform Management? Can or Should that Knowledge Gap be Admissible?

Reading Time: 6 minutesStatus: Final Blueprint (Summary) Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: June 1, 2024 Location: Dhaka, Bangladesh Version: 1.0 1. The Core Dilemma: Assessor vs. Builder Mindset We are observing worldwide adoption on CISSP Read More …

Cloud Attack Patterns That Reveal About Adversary Strategy

Reading Time: 4 minutes Adversaries no longer focus on breaching a hardened network border; instead, they target the very fabric of the cloud—its identities, configurations, and APIs.

Multi-Cloud Security in the Enterprise

Reading Time: 3 minutesThe modern enterprise operates in a multi-cloud reality. However, this state is often reached “accidentally” through uncoordinated business decisions, leading to a fragmented and dangerously complex security posture.

Importance of the DNS Server in Your Enterprise Grade Infrastructure

Reading Time: 4 minutesStatus: Final Blueprint Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: August 8, 2022 Location: Dhaka, Bangladesh Version: 1.0 1. Executive Summary: DNS as a Strategic Control Plane The Domain Name System (DNS) is no Read More …

Breach & Attack Simulation in Your SOC

Reading Time: 3 minutesStatus: Final Blueprint (Condensed) Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: January 6, 2022 Location: Dhaka, Bangladesh Version: 1.0 (Summary) Executive Summary In a landscape of relentless cyber threats, traditional, point-in-time security assessments are Read More …

SOC Capability Model

Reading Time: 3 minutesStatus: Final Blueprint Summary Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: April 4, 2024 The SOC as a Strategic Business Enabler The modern Security Operations Center (SOC) has evolved from a technical cost center Read More …

Why You Need Both CASB & A WAF Even Though You Have A DDoS Appliance

Reading Time: 4 minutesStatus: Final Blueprint (Summary) Author: Shahab Al Yamin Chawdhury Version: 1.0 1. Executive Summary: The Illusion of a Single Defense In the modern digital landscape, relying solely on a Distributed Denial-of-Service (DDoS) appliance creates a dangerous false sense of security. Read More …