ai cybersecurity Creating an LLM AI security checklist for rapid fieldwork use Learn how security teams can help companies safely adopt LLM AIs by using a fieldwork checklist based on OWASP
azure sentinel labs Build an Azure Sentinel lab - part one: deployment automation basics Azure Sentinel is a key player in the cloud SIEM space. Learn the fundamentals by deploying a cheap, yet capable, lab
ai cybersecurity How to run data breach simulations Need to run a data breach simulation? Learn how to organise and execute them quickly and efficiently
ai cybersecurity Running rapid risk assessments using Google Gemini and Confluence Need to run a risk assessment for a project or tool? Learn how Gemini and Confluence can help you do it faster
free isms Build a free ISMS: how to create a great landing page A landing page is a key part of your ISMS. Learn how to create the perfect one to help your colleagues and auditors
cybersecurity metrics Confluence pentest reporting: simple KPIs to track remediation performance Need to track the remediation of pentest findings? Use confluence reporting tools to stay on top of the game
cybersecurity bootstrapping Building an awesome security wiki: tips and tricks for busy teams Are you leading a security team and have a documentation problem? Learn how to fix it today and save your future self
ciso skills Help I'm a new CISO! Tips to make a great impression on probation Have you managed to land your first CISO role? Great, now you need to quickly impress! Find out exactly how it's done
free isms How to build a free ISMS with ChatGPT ChatGPT can accelerate the creation of a free Information Security Management System. Find out how in this post
cybersecurity bootstrapping How to start a cybersecurity program Creating a cybersecurity program does not have to be an expensive and complex challenge. Find out how in this post
agile cybersecurity How to implement Agile cybersecurity: five common challenges to manage Can you increase your team's value delivery by adopting Agile cybersecurity principles? Yes, but the road is paved with challenges! Find out exactly how to manage them
cybersecurity automation How to process pentest findings with Jira and Confluence Keeping on top of pentest findings is challenging. Find out how to process your pentests in an automated, auditable and asynchronous manner by using Jira and Confluence