cyber-101
What is KQL and how can I write effective queries for Security Operations?
New to Kusto? Learn what KQL is, why it beats SQL for log analysis, and how to write high-performance queries for Microsoft Sentinel and Security Operations
cyber-101
Understanding the "plumbing" of Microsoft Sentinel.
cyber-101
A quick reference guide for common KQL operators and queries.
cyber-101
A quick description of how PAC files work.
cyber-101
Exploring a foundation of identity service.
cyber-101
A quick walk-through of HEC.
coding-101
A brief intro to a big topic.
cyber-101
A quick exploration of risk management.
cyber-101
A walkthrough of various DLP techniques.
coding-101
A quick explanation of popular casing styles.
Cybersecurity and devops questions. Answered.
Unpacking the deployment methodology for ZPA.
A helpful technique for extracting contents from minimal containers.
Simple principles for optimizing connectivity to M365.
Let's discuss the thought process for defining and implementing bandwidth control in Zscaler.
Clarifying the differences between a couple similar terms.
How do we know that file type is REALLY that file type?
How picky can we be with Zscaler cloud app control?
Understanding the ingredients for risk...
A brief walk-through of the recommended phases to rollout TLS inspection.
A very brief intro to comparing these AI systems.
How can Zscaler client connector tell it's on a trusted network?
Sequential steps and thought process for deploying the Zscaler client connector app.