Tuesday, October 3, 2023
Vulnerability Management - Vulnerability Dashboard using Power BI
CyberSecurity - Why do we need standard data formats ?
As we all know there are data formats for various standards related to storage, representation and exchange of information in CyberSecurity domain for e.g.
For
1. Vulnerability - CVE
2. Platform - CPE, SWID and PURL
3. Configuration - CCE
4. Vulnerability Scoring - CVSS
5. SBOM - CycloneDX and SPDX
6. Identity Information - SAML and JWT
7. Malware Information - MAEC and MISP
8. Threat Information - STIX and TAXII
9. Log File - CSV, JSON, KVP (Key Value Pair) and CEF (Common Event Format)
and the list goes on.
Standard data formats are necessary because of the following reasons:
1. Enables correlation, integration and automation
2. Exchanging information among security vendors; among security researchers
3. Allows for the faster development of countermeasures (signatures and security patches)
4. Reduces potential duplication of malware and vulnerability analysis efforts by researchers
Happy Learning !!
Vulnerability Management - Basics for beginners
Beginners in Vulnerability Management domain have doubts such as from where to begin or what to study. I have created a document and tried to answer such doubts. It is always good to learn basics and then move towards advanced concepts. I have tried to provide links to corresponding points in the document as much as I can. Cases where you don't find any link or the link present is expired, you can always google :).
Following are the points I want to highlight through this post:
- For beginners please don't try to search interview questions directly. First create a theoretical base and realize the concepts by performing practicals.
- Slow and steady wins the race, so, give 4-6 months of time. While going through the document you can observe, 40%-60% concepts are basics, hence you will not be wasting time by learning them. After some time if you don't find Vulnerability Management interesting, you can always navigate to other subdomains like incident response and penetration testing.
- You will get hands-on on enterprise solutions once you join an organization. You will face a different set of challenges there. Many on LinkedIn create posts to address such challenges but first clear your basics to understand such posts/articles.
- Once you have performed above steps, you can search interview questions and start appearing for interviews.
- I do not recommend directly going for global certifications as a lot of content is there on internet.
Finally, I find articles from Balint F. very interesting.
https://www.linkedin.com/in/balint-fazakas/recent-activity/articles/
Happy Learning !!
Vulnerability Management - Understanding vulnerability posture
Understanding the vulnerability posture of an organisation at a basic level helps you drive remediation efforts. So, I don't know what t...
-
Scan based findings are related to a particular scan. It cannot tell you whether a vulnerability which existed earlier was fixed or not. It ...
-
There are lot of ways but following are the common ones: 1 . Zones Every company organizes its infrastructure in zones like "External F...
-
Your vulnerability scan did not find as many vulnerabilities as you were expecting in a normal authenticated scan? Even when credentials pro...