Saul Mulcrow

Lacework FortiCNAPP Explained – Attack Path Analysis (APA) – Episode 4

Video Lacework Explained – Attack Path Analysis (APA) Episode 4 Series Overview Video Summary This video provides an in-depth look into cloud security, focusing on how attackers typically exploit multiple vulnerabilities in sequence to compromise cloud infrastructure. The discussion highlights how traditional alert systems often produce excessive noise, making it difficult for security analysts to […]

Lacework FortiCNAPP Explained – Attack Path Analysis (APA) – Episode 4 Read More »

Lacework FortiCNAPP Explained – Cloud Compliance – Episode 3

Video Lacework Explained – Cloud Compliance Episode 3 Series Overview Video Summary This video delves into the challenges of cloud compliance, particularly the complexities faced by organisations managing configurations across multiple levels and teams. It highlights how non-compliance with established standards can increase the risk of security breaches. The video emphasises how assessing overall compliance

Lacework FortiCNAPP Explained – Cloud Compliance – Episode 3 Read More »

Lacework Explained IaC Security thumbnail

Lacework FortiCNAPP Explained – IaC Security – Episode 2

Video Lacework Explained – IaC Security Episode 2 Series Overview Video Summary In this video, we delve into the application of infrastructure as code (IaC) within Lacework, focusing on how it enhances security throughout the development process. The concept of “shift left” security is explored, emphasising the importance of identifying and resolving potential threats early

Lacework FortiCNAPP Explained – IaC Security – Episode 2 Read More »

Lacework FortiCNAPP Explained – Scanning and Reporting – Episode 1

Video Lacework Explained – Scanning and Reporting Episode 1 Series Overview Video Summary This video explores the process of vulnerability scanning and reporting using Lacework, a leading cybersecurity platform. It provides a detailed look at how Lacework handles vulnerabilities in both hosts and containers, focusing on its ability to identify and assess risks within cloud

Lacework FortiCNAPP Explained – Scanning and Reporting – Episode 1 Read More »

Splunk Soar Explained Digitising Playbooks

Splunk SOAR Explained – Digitising Playbooks – Episode 5

Video Splunk SOAR Explained – Digitising Playbooks Episode 5 Series Overview Video Summary This video explains how existing incident response playbooks can be digitised using Splunk SOAR to enhance automation and streamline workflows. It outlines two main approaches to playbook design: automated and workflow-oriented. The automated approach focuses on sending events to Splunk SOAR for

Splunk SOAR Explained – Digitising Playbooks – Episode 5 Read More »

Splunk SOAR Explained – Response 101 – Episode 4

Video Splunk SOAR Explained – Response 101 Episode 4 Series Overview Video Summary This video demonstrates how Splunk SOAR (Security Orchestration, Automation, and Response) can be used to streamline event response by automating workflows and improving collaboration within security teams. It explores how data from multiple sources, such as structured data from SIEM systems and

Splunk SOAR Explained – Response 101 – Episode 4 Read More »

Splunk SOAR Explained – Achieving Security Orchestration – Episode 2

Video Splunk SOAR Explained – Achieving Security Orchestration Episode 2 Series Overview Video Summary This video focuses on how security orchestration is achieved within Splunk SOAR through the use of apps. These apps enable the integration and coordination of security functions by connecting various security tools, allowing programmatic control over security actions. With over 350

Splunk SOAR Explained – Achieving Security Orchestration – Episode 2 Read More »

Splunk SOAR Explained – How to Build Playbooks – Episode 3

Video Splunk SOAR Explained – How to Build Playbooks Episode 3 Series Overview Video Summary This video explains the process of building a Playbook within Splunk SOAR using the visual Playbook editor. Playbooks are designed to automate repetitive and time-consuming tasks, making security operations more efficient. A well-crafted Playbook should be easy to maintain and

Splunk SOAR Explained – How to Build Playbooks – Episode 3 Read More »

Splunk for Security Data Models Acceleration - Episode 2

Splunk for Security: Normalisation – CIM Data Models Acceleration – Episode 2

Video Splunk for Security: Normalisation – CIM Data Models Acceleration Episode 2 Series Overview Video Summary In the second episode of our series on the Common Information Model (CIM), we explore how to maximise the benefits of CIM by effectively normalising data. The CIM itself is essentially a comprehensive collection of data models that Splunk

Splunk for Security: Normalisation – CIM Data Models Acceleration – Episode 2 Read More »

Scroll to Top