Sitemap - 2023 - Rod’s Blog

How AI Will Be Used for Cyber Security in 2024

AI Certifications to Pursue in 2024

The Best Cybersecurity Certifications to Pursue in 2024

Make a Commitment to Stay Mentally and Physically Resilient as a Cybersecurity Analyst in 2024

The Top 10 Generative AI Advancements in 2023

The Best Skills to Obtain to Help Make Generative AI Safe, Secure, and Responsible in 2024

The Future of XDR in 2024: Trends, Challenges, and Opportunities

The KQL Mysteries: The Holiday 2023 Episode - Post Credits Scene

Are You Considering a Career Pivot into the Security of AI?

Invite your friends to read Rod’s Blog

Site Update

Generative AI: What Happened, Where It's Going 2023-2024

The Essential Cybersecurity Skillsets for 2024

Microsoft Security Copilot Demos from Microsoft Ignite 2023

The Best Skillsets to Learn in 2024 for Generative AI

The Best Skillsets to Learn in 2024 to Use Microsoft Security Copilot Effectively

The KQL Mysteries: The Holiday 2023 Episode Part 4

Prompt Engineering for AI: A Valuable Skill for Security Professionals?

The KQL Mysteries: The Holiday 2023 Episode Part 3

The KQL Mysteries: The Holiday 2023 Episode Part 2

The KQL Mysteries: The Holiday 2023 Episode Part 1

Episode 7: Twas the Night Before KQL

The Ways Microsoft Security Copilot Can Enhance Security Operations with Microsoft Intune

The Ways Microsoft Security Copilot Can Enhance Security Operations with Microsoft Defender

The Ways Microsoft Security Copilot Can Enhance Security Operations with Microsoft Sentinel

The KQL Mysteries Season 1: Chapter 2

Must Learn AI Security Compendium 17: Cognitive Security

Must Learn AI Security Now Available from Amazon

Must Learn AI Security Compendium 16: Shadow AI

Tip: Turning on Search Job Mode in the Microsoft Sentinel Logs Blade

The KQL Mysteries Season 1: Chapter 1

Must Learn AI Security Part 25: Sponge Attacks Against AI

Episode 6: Security Copilot at Microsoft Ignite 2023

The KQL Mysteries Season 1: Prologue

Using Microsoft Purview for Data Classification and Labeling to Secure Generative AI

Must Learn AI Security Compendium 15: Securing AI Endpoints

The Three Tenets for AI Security and How to Audit Activity Logs

Must Learn AI Security Compendium 14: Securing On-prem LLMs

How Microsoft Security Copilot Can Help Defend Against Cyberthreats

How to Monitor the Microsoft Sentinel Trial Period

Microsoft Security Copilot - the Introduction

Microsoft Sentinel SOC 101: How to Detect and Mitigate Rare Domains Seen in Cloud Logs with Microsoft Sentinel

Must Learn AI Security Epilogue: Securing AI is a Three-Pronged Approach

Microsoft Sentinel SOC 101: How to Detect and Mitigate Login Attempts Using Legacy Auth with Microsoft Sentinel

Must Learn AI Security Compendium 13: Zero Trust for AI

Must Learn AI Security Part 24: Copy-move Attacks Against AI

Microsoft Sentinel SOC 101: How to Detect and Mitigate Rare Domains Seen in Cloud Logs

Must Learn AI Security Part 23: Blurring or Masking Attacks Against AI

Must Learn AI Security Part 22: Machine Learning Attacks Against AI

Microsoft Sentinel SOC 101: How to Detect and Mitigate a VIP Account that has Multiple Failed Logons within a Threshold with Microsoft Sentinel

Must Learn AI Security Compendium 12: Red Teaming Strategies for Safeguarding Large Language Models and Their Applications

Microsoft Sentinel SOC 101: How to Detect and Mitigate Botnet Attacks with Microsoft Sentinel

Must Learn AI Security Compendium 11: Threat Modeling AI/ML Systems

Must Learn AI Security Compendium 10: Challenges of Enhancing AI Language Models with External Knowledge

Using Microsoft Sentinel to Monitor, Detect and Alert Bad AI Content

Microsoft Sentinel SOC 101: How to Detect and Mitigate Advanced Persistent Threats (APTs) with Microsoft Sentinel

Microsoft Sentinel SOC 101: How to Detect and Mitigate a DNS Spoofing Attack with Microsoft Sentinel

Tip: Catch up on Microsoft Security Copilot Over a Weekend

Must Learn AI Security Compendium 9: The Argument for Safe AI

Microsoft Sentinel SOC 101: How to Detect and Mitigate Zero-day Exploits with Microsoft Sentinel

Must Learn AI Security Compendium 8: The CISO Guide to Generative AI Security

Microsoft Sentinel SOC 101: How to Detect and Mitigate Fileless Malware Attacks with Microsoft Sentinel

How to Get UEBA Costs for Microsoft Sentinel

Microsoft Sentinel SOC 101: How to Detect and Mitigate Session Token Stealing Attacks with Microsoft Sentinel

Microsoft Sentinel SOC 101: How to Detect and Mitigate Quishing Attacks with Microsoft Sentinel

Must Learn AI Security Part 21: Watermark Removal Attacks Against AI

Microsoft Sentinel SOC 101: How to Detect and Mitigate Drive-by Download Attacks with Microsoft Sentinel

Must Learn AI Security Compendium 7: What is Generative Automation?

Microsoft Sentinel SOC 101: How to Detect and Mitigate Cryptojacking Attacks with Microsoft Sentinel

Must Learn AI Security Part 20: Text-based Attacks Against AI

How to be Notified When Microsoft Sentinel Data Stops Populating

Microsoft Sentinel SOC 101: How to Detect and Mitigate Keylogger Attacks with Microsoft Sentinel

Must Learn AI Security Part 19: Deepfake Attacks Against AI

Microsoft Sentinel SOC 101: How to Detect and Mitigate Man/Adversary-in-the-Middle (MitM/AitM) Attacks with Microsoft Sentinel

Must Learn AI Security Part 18: Bias Exploitation Attacks Against AI

Microsoft Sentinel SOC 101: How to Detect and Mitigate Denial of Service Attacks with Microsoft Sentinel

Must Learn AI Security Part 17: Social Engineering Attacks Against AI

Microsoft Sentinel SOC 101: How to Detect and Mitigate SQL Injection Attacks with Microsoft Sentinel

Microsoft Sentinel SOC 101: How to Detect and Mitigate Credential Reuse Attacks with Microsoft Sentinel

Must Learn AI Security Compendium 6: Ensuring Trust and Ethical Practices

Episode 5: Announcing the Microsoft Sentinel SOC 101 Blog Series

Microsoft Sentinel SOC 101: How to Detect and Mitigate Supply Chain Attacks with Microsoft Sentinel

Must Learn AI Security Part 16: Impersonation Attacks Against AI

Microsoft Sentinel SOC 101: Leveraging MITRE ATT&CK Techniques with Microsoft Sentinel

Must Learn AI Security Part 15: Misinformation Attacks Against AI

Microsoft Sentinel SOC 101: How to Detect and Mitigate Cross-Site Scripting (XSS) Attacks with Microsoft Sentinel

Microsoft Sentinel SOC 101: How to Detect and Mitigate Malware Attacks with Microsoft Sentinel

Must Learn AI Security Compendium 5: The Rise of AI in the IT Sector

Microsoft Sentinel SOC 101: How to Detect and Mitigate Phishing Attacks with Microsoft Sentinel

Must Learn AI Security Compendium 4: Leveraging Generative AI for Cybersecurity Defense

Microsoft Sentinel SOC 101: How to Detect and Mitigate Brute Force Attacks with Microsoft Sentinel

Must Learn AI Security Part 14: Inference Attacks Against AI

Episode 4: Preparing Microsoft Sentinel for Generative AI

Using Kali Linux and Hydra for Attack Testing and Alert Generation

Must Learn Quantum Security Preface: The Power of Quantum Computing in Advancing Artificial Intelligence

Must Learn AI Security Part 13: Generative Attacks Against AI

Must Learn AI Security Part 12: Reward Hacking Attacks Against AI

Must Learn AI Security Compendium 3: Exploring the Different Types of AI Technology

Must Learn AI Security Compendium 2: Generative AI vs. Machine Learning

Must Learn AI Security Part 11: Denial-of-Service Attacks Against AI

Must Learn AI Security Part 10: Backdoor Attacks Against AI

Must Learn AI Security Compendium 1: AI Cyber Attacks - The Rising Threat to Security

Must Learn AI Security Part 9: Hyperparameter Attacks Against AI

My Current Thoughts on Using AI with a Modern SIEM

Preparing the SOC for Generative AI

Must Learn AI Security Part 8: Model Stealing Attacks Against AI

Must Learn AI Security on Kindle Vella

Must Learn AI Security

AI on AI Security

Episode 3: Security and the AI-102 exam

Must Learn AI Security Part 7: Membership Inference Attacks Against AI

Must Learn AI Security Part 6: Model Inversion Attacks Against AI

Must Learn AI Security Part 5: Evasion Attacks Against AI

Must Learn AI Security Part 4: Trojan Attacks Against AI

Episode 2: Azure OpenAI Content Filtering and Abuse Monitoring with Microsoft Sentinel

I AM AI

Must Learn AI Security Part 3: Adversarial Attacks Against AI

Finding the After the Blog Podcast

Azure OpenAI Content Filtering and Abuse Monitoring with Microsoft Sentinel

Episode 1: Must Learn AI Security Series: Introduction

Must Learn AI Security Part 2: Data Poisoning Attacks Against AI

Using Azure AI Studio to Reduce Hallucinations

Permissions Required to Migrate to the New Simplified Pricing Model in Microsoft Sentinel

Azure AI Studio Tip: Deploying to an Existing Web App Generates a Newly Registered AAD App Every Time

Quick Tip: Give Your Copilot a Personality

Quick Tip: Give Your Copilot a Name

How to Know When Data Retention Values Have Changed for Microsoft Sentinel

Must Learn AI Security Series: Introduction

Must Learn AI Security Part 1: Prompt Injection Attacks Against AI

Made by AI: A Modern Monty Python Skit Sketch

Basic Steps to Create Your Own Simple Copilot

Tip: Reset Your Wrecked Web App from the Azure OpenAI Chat Playground

PSA: Migrate from the Threat Intelligence Platform Connector to the Threat Intelligence Solution in Microsoft Sentinel

KQL Queries Behind the Microsoft Sentinel Overview Page

Microsoft Sentinel Content Hub Changes

A Quick Way to Verify the Connection Between Microsoft Defender External Attack Surface and Microsoft Sentinel

Track Major New Features for Microsoft Security Products Using RSS Feeds

Microsoft Sentinel What's New Page Now has an RSS Feed

Defender for Cloud Learn Doc Gets Its Own RSS Feed

Update now: Stop Running Playbooks Directly from Analytics Rules

Removing Deprecated Analytics Rules in Microsoft Sentinel

Getting GEO Information for IP Addresses without Using a Microsoft Sentinel Playbook

5 Signs that You're a Must Learn KQL Addict

Easy Way to Build KQL Query Templates for Azure Services

Must Learn KQL Part 20: Building Your First Microsoft Sentinel Analytics Rule

Must Learn KQL Part 19: The Join Operator

Must Learn KQL Part 18: The Union Operator

Must Learn KQL Part 17: The Let Statement

Must Learn KQL Part 16: The Order/Sort and Top Operators

Must Learn KQL Part 15: The Distinct Operator

Must Learn KQL Part 14: The Project Operator

Must Learn KQL Part 13: The Extend Operator

Must Learn KQL Part 12: The Render Operator

Must Learn KQL Part 11: The Summarize Operator

Must Learn KQL Part 10: The Count Operator

Must Learn KQL Part 9: The Limit and Take Operators

Must Learn KQL Part 8: The Where Operator

Must Learn KQL Part 7: Schema Talk

Must Learn KQL Part 6: Interface Intimacy

Must Learn KQL Part 5: Turn Search into Workflow

Must Learn KQL Part 4: Search for Fun and Profit

Must Learn KQL Part 3: Workflow

Must Learn KQL Part 2: Just Above Sea Level

Must Learn KQL Part 1: Tools and Resources

What Does Private Preview, Public Preview, and GA Mean?

Building Your own Conversational Copilot with Python, Flask, and Azure Open AI SDK

Monitor Azure Open AI Deployments with Microsoft Sentinel

Getting Responses to Questions from Azure Open AI ChatGPT in a CMD Window

Cross-workspace Query Best Practice for Microsoft Sentinel

Join me on Notes

Getting IBM X-Force Exchange Threat Intelligence TAXII Service Information for Use with Microsoft Sentinel

An AI Way to Create XPath Queries for Microsoft Sentinel DCRs

Shortcut Way to Create XPath Queries for Microsoft Sentinel DCRs

Open Sourcing the Must Learn KQL Workshop Deck

Using Azure Open AI with Microsoft Sentinel Part 2 - Converting Data to JSONL

Using Azure Open AI with Microsoft Sentinel Part 1 - Getting Keys and Endpoints

Properly Setting Up the New MDTI Solution for Microsoft Sentinel

Generating KQL from Microsoft Sentinel Incidents with ChatGPT

Monitoring Updates to the Microsoft Sentinel GitHub Repo

Monitoring ChatGPT Usage in Microsoft Sentinel

Building Microsoft Sentinel Detections for Azure Open AI

Join my chat

Open Sourcing Discussions and Content for Responsible and Secure AI

Building a Better What's New Page for Microsoft Sentinel

Two New Features Sneak into the Microsoft Sentinel Incident Experience

How to Export and Import KQL Query Packs

Dipping a Toe into the Microsoft Sentinel Integration with GPT-3

Connecting Azure Active Directory to Microsoft Sentinel Through the Diagnostic Setting

How to Generate Microsoft Sentinel Incidents for Testing and Demos

Top New Incident Experience Features for Microsoft Sentinel

The Revoke Action for Threat Indicators in Microsoft Sentinel

How to Send Azure Storage Logs to Microsoft Sentinel

How to Quickly Tell Which Microsoft Sentinel Tables are Configured as Basic Logs

How to Get a List of Your Active Analytics Rules for Microsoft Sentinel

Receive an Email Notification Each Morning with the List of Daily Microsoft Sentinel Incidents Created

Using Logic App Parameters with Microsoft Sentinel Playbooks

How to Use a Playbook to Add Geographical Data for IP Addresses to a Microsoft Sentinel Incident

How to Query HaveIBeenPwned Using a Microsoft Sentinel Playbook

Viewing Microsoft Sentinel Rules with MITRE Tactics Directly in Excel

Alert When Microsoft Sentinel Daily Ingestion Reaches a Threshold

Is Moving the Sentinel Workspace to Another Resource Group or Subscription Supported?

How to Get the KQL Query Created by the New 365 Defender Query Builder

Building Microsoft Sentinel Incident Tasks Recipes

Building Your Own Potential Malicious Events Heatmap for Microsoft Sentinel

New Sentinel Role: Playbook Operator

Easy Way to Build KQL Query Templates for Azure Services

The Easy Way to Get the ARM Deployment Template for a Microsoft Sentinel Solution

Creating an URL Detonation Demo for Microsoft Sentinel

All the Microsoft Ninja Training I Know About