-
From Boot to Logon: Windows processes
Recently, I attempted to participate in my first CTF, hosted by the DFIR Report. This experience humbled me and made me realise the knowledge gaps I have, particularly in one area: Windows processes. In this article, I document the normal behaviour of Windows authentication processes and log behaviour in Splunk. What you will read here…
-

NIS2 Directive: what’s new?
The European Member States are navigating the complex landscape of cybersecurity with the new directive NIS2, which aims to harmonize compliance regulations and extend the scope to include essential and important entities. NIS2 emphasizes reporting obligations, imposes fines for non-compliance, and focuses on risk management, resilience, incident handling, business continuity, supply chain security, and cyber…