Blog on SecurityBLOG ON SECURITY
  • About this blog
Creating an LLM AI security checklist for rapid fieldwork use
ai cybersecurity

Creating an LLM AI security checklist for rapid fieldwork use

Learn how security teams can help companies safely adopt LLM AIs by using a fieldwork checklist based on OWASP
Read More
Staff
Build an Azure Sentinel lab - part one: deployment automation basics
azure sentinel labs

Build an Azure Sentinel lab - part one: deployment automation basics

Azure Sentinel is a key player in the cloud SIEM space. Learn the fundamentals by deploying a cheap, yet capable, lab
Read More
Staff
How to run data breach simulations
ai cybersecurity

How to run data breach simulations

Need to run a data breach simulation? Learn how to organise and execute them quickly and efficiently
Read More
Staff
Running rapid risk assessments using Google Gemini and Confluence
ai cybersecurity

Running rapid risk assessments using Google Gemini and Confluence

Need to run a risk assessment for a project or tool? Learn how Gemini and Confluence can help you do it faster
Read More
Staff
Build a free ISMS: how to create a great landing page
free isms

Build a free ISMS: how to create a great landing page

A landing page is a key part of your ISMS. Learn how to create the perfect one to help your colleagues and auditors
Read More
Staff
Confluence pentest reporting: simple KPIs to track remediation performance
cybersecurity metrics

Confluence pentest reporting: simple KPIs to track remediation performance

Need to track the remediation of pentest findings? Use confluence reporting tools to stay on top of the game
Read More
Staff
Building an awesome security wiki: tips and tricks for busy teams
cybersecurity bootstrapping

Building an awesome security wiki: tips and tricks for busy teams

Are you leading a security team and have a documentation problem? Learn how to fix it today and save your future self
Read More
Staff
Help I'm a new CISO! Tips to make a great impression on probation
ciso skills

Help I'm a new CISO! Tips to make a great impression on probation

Have you managed to land your first CISO role? Great, now you need to quickly impress! Find out exactly how it's done
Read More
Staff
How to build a free ISMS with ChatGPT
free isms

How to build a free ISMS with ChatGPT

ChatGPT can accelerate the creation of a free Information Security Management System. Find out how in this post
Read More
Staff
How to start a cybersecurity program
cybersecurity bootstrapping

How to start a cybersecurity program

Creating a cybersecurity program does not have to be an expensive and complex challenge. Find out how in this post
Read More
Staff
How to implement Agile cybersecurity: five common challenges to manage
agile cybersecurity

How to implement Agile cybersecurity: five common challenges to manage

Can you increase your team's value delivery by adopting Agile cybersecurity principles? Yes, but the road is paved with challenges! Find out exactly how to manage them
Read More
Staff
How to process pentest findings with Jira and Confluence
cybersecurity automation

How to process pentest findings with Jira and Confluence

Keeping on top of pentest findings is challenging. Find out how to process your pentests in an automated, auditable and asynchronous manner by using Jira and Confluence
Read More
Staff
Blog on Security © 2025
  • Subscribe
  • Privacy policy
  • Edoardo Gerosa
Powered by Ghost