Cybersecurity Unlocked
At TridentStack, We provide honeypots and mitigation templates that connect directly to our SIEM/SOC/SOAR SAAS of every customer.
Every time.
However, good security controls should never be locked behind a paywall.
That’s why we’ve created this blog, every control we recommend to customers will (eventually) be written here, as well as configuration guides, security architecture, SIEM rules reviews, and more.
We can be more secure, together.
Feel free to email topic suggestions to
blog@tridentstack.com
Build a NIST 800-63B Compliant Password Policy in 1 Hour […]
Controls for Protecting Microsoft 365: A First Person Incident Response […]
Cleaning Up Risky Traffic, A Mini Series: WPAD Web Proxy […]
Cleaning Up Risky Traffic, A Mini Series: SMB Signing This […]
Cleaning Up Risky Traffic, A Mini Series: NBNS To view […]
Cleaning Up Risky Traffic, A Mini Series: LLMNR To view […]
Domain Isolation with Windows Firewall (ZTNA for free!) Foreword: This […]
To view other posts in this mini series, select the […]
Using Group Policy To Secure Rogue IPv6 in Small Enterprises […]
Preventing Malware via End User Execution in Windows [T1204] In […]
Quick & Easy Group Policy Objects To Reduce Risk As […]
Windows Logging Expansion via Sysmon: A Comprehensive Guide to Improving […]
CIS Benchmarking In this post, we will explore a specific […]