Sitemap - 2023 - Rod’s Blog
How AI Will Be Used for Cyber Security in 2024
AI Certifications to Pursue in 2024
The Best Cybersecurity Certifications to Pursue in 2024
Make a Commitment to Stay Mentally and Physically Resilient as a Cybersecurity Analyst in 2024
The Top 10 Generative AI Advancements in 2023
The Best Skills to Obtain to Help Make Generative AI Safe, Secure, and Responsible in 2024
The Future of XDR in 2024: Trends, Challenges, and Opportunities
The KQL Mysteries: The Holiday 2023 Episode - Post Credits Scene
Are You Considering a Career Pivot into the Security of AI?
Invite your friends to read Rod’s Blog
Generative AI: What Happened, Where It's Going 2023-2024
The Essential Cybersecurity Skillsets for 2024
Microsoft Security Copilot Demos from Microsoft Ignite 2023
The Best Skillsets to Learn in 2024 for Generative AI
The Best Skillsets to Learn in 2024 to Use Microsoft Security Copilot Effectively
The KQL Mysteries: The Holiday 2023 Episode Part 4
Prompt Engineering for AI: A Valuable Skill for Security Professionals?
The KQL Mysteries: The Holiday 2023 Episode Part 3
The KQL Mysteries: The Holiday 2023 Episode Part 2
The KQL Mysteries: The Holiday 2023 Episode Part 1
Episode 7: Twas the Night Before KQL
The Ways Microsoft Security Copilot Can Enhance Security Operations with Microsoft Intune
The Ways Microsoft Security Copilot Can Enhance Security Operations with Microsoft Defender
The Ways Microsoft Security Copilot Can Enhance Security Operations with Microsoft Sentinel
The KQL Mysteries Season 1: Chapter 2
Must Learn AI Security Compendium 17: Cognitive Security
Must Learn AI Security Now Available from Amazon
Must Learn AI Security Compendium 16: Shadow AI
Tip: Turning on Search Job Mode in the Microsoft Sentinel Logs Blade
The KQL Mysteries Season 1: Chapter 1
Must Learn AI Security Part 25: Sponge Attacks Against AI
Episode 6: Security Copilot at Microsoft Ignite 2023
The KQL Mysteries Season 1: Prologue
Using Microsoft Purview for Data Classification and Labeling to Secure Generative AI
Must Learn AI Security Compendium 15: Securing AI Endpoints
The Three Tenets for AI Security and How to Audit Activity Logs
Must Learn AI Security Compendium 14: Securing On-prem LLMs
How Microsoft Security Copilot Can Help Defend Against Cyberthreats
How to Monitor the Microsoft Sentinel Trial Period
Microsoft Security Copilot - the Introduction
Must Learn AI Security Epilogue: Securing AI is a Three-Pronged Approach
Must Learn AI Security Compendium 13: Zero Trust for AI
Must Learn AI Security Part 24: Copy-move Attacks Against AI
Microsoft Sentinel SOC 101: How to Detect and Mitigate Rare Domains Seen in Cloud Logs
Must Learn AI Security Part 23: Blurring or Masking Attacks Against AI
Must Learn AI Security Part 22: Machine Learning Attacks Against AI
Microsoft Sentinel SOC 101: How to Detect and Mitigate Botnet Attacks with Microsoft Sentinel
Must Learn AI Security Compendium 11: Threat Modeling AI/ML Systems
Using Microsoft Sentinel to Monitor, Detect and Alert Bad AI Content
Microsoft Sentinel SOC 101: How to Detect and Mitigate a DNS Spoofing Attack with Microsoft Sentinel
Tip: Catch up on Microsoft Security Copilot Over a Weekend
Must Learn AI Security Compendium 9: The Argument for Safe AI
Microsoft Sentinel SOC 101: How to Detect and Mitigate Zero-day Exploits with Microsoft Sentinel
Must Learn AI Security Compendium 8: The CISO Guide to Generative AI Security
How to Get UEBA Costs for Microsoft Sentinel
Microsoft Sentinel SOC 101: How to Detect and Mitigate Quishing Attacks with Microsoft Sentinel
Must Learn AI Security Part 21: Watermark Removal Attacks Against AI
Must Learn AI Security Compendium 7: What is Generative Automation?
Microsoft Sentinel SOC 101: How to Detect and Mitigate Cryptojacking Attacks with Microsoft Sentinel
Must Learn AI Security Part 20: Text-based Attacks Against AI
How to be Notified When Microsoft Sentinel Data Stops Populating
Microsoft Sentinel SOC 101: How to Detect and Mitigate Keylogger Attacks with Microsoft Sentinel
Must Learn AI Security Part 19: Deepfake Attacks Against AI
Must Learn AI Security Part 18: Bias Exploitation Attacks Against AI
Must Learn AI Security Part 17: Social Engineering Attacks Against AI
Microsoft Sentinel SOC 101: How to Detect and Mitigate SQL Injection Attacks with Microsoft Sentinel
Must Learn AI Security Compendium 6: Ensuring Trust and Ethical Practices
Episode 5: Announcing the Microsoft Sentinel SOC 101 Blog Series
Microsoft Sentinel SOC 101: How to Detect and Mitigate Supply Chain Attacks with Microsoft Sentinel
Must Learn AI Security Part 16: Impersonation Attacks Against AI
Microsoft Sentinel SOC 101: Leveraging MITRE ATT&CK Techniques with Microsoft Sentinel
Must Learn AI Security Part 15: Misinformation Attacks Against AI
Microsoft Sentinel SOC 101: How to Detect and Mitigate Malware Attacks with Microsoft Sentinel
Must Learn AI Security Compendium 5: The Rise of AI in the IT Sector
Microsoft Sentinel SOC 101: How to Detect and Mitigate Phishing Attacks with Microsoft Sentinel
Must Learn AI Security Compendium 4: Leveraging Generative AI for Cybersecurity Defense
Microsoft Sentinel SOC 101: How to Detect and Mitigate Brute Force Attacks with Microsoft Sentinel
Must Learn AI Security Part 14: Inference Attacks Against AI
Episode 4: Preparing Microsoft Sentinel for Generative AI
Using Kali Linux and Hydra for Attack Testing and Alert Generation
Must Learn AI Security Part 13: Generative Attacks Against AI
Must Learn AI Security Part 12: Reward Hacking Attacks Against AI
Must Learn AI Security Compendium 3: Exploring the Different Types of AI Technology
Must Learn AI Security Compendium 2: Generative AI vs. Machine Learning
Must Learn AI Security Part 11: Denial-of-Service Attacks Against AI
Must Learn AI Security Part 10: Backdoor Attacks Against AI
Must Learn AI Security Compendium 1: AI Cyber Attacks - The Rising Threat to Security
Must Learn AI Security Part 9: Hyperparameter Attacks Against AI
My Current Thoughts on Using AI with a Modern SIEM
Preparing the SOC for Generative AI
Must Learn AI Security Part 8: Model Stealing Attacks Against AI
Must Learn AI Security on Kindle Vella
Episode 3: Security and the AI-102 exam
Must Learn AI Security Part 7: Membership Inference Attacks Against AI
Must Learn AI Security Part 6: Model Inversion Attacks Against AI
Must Learn AI Security Part 5: Evasion Attacks Against AI
Must Learn AI Security Part 4: Trojan Attacks Against AI
Episode 2: Azure OpenAI Content Filtering and Abuse Monitoring with Microsoft Sentinel
Must Learn AI Security Part 3: Adversarial Attacks Against AI
Finding the After the Blog Podcast
Azure OpenAI Content Filtering and Abuse Monitoring with Microsoft Sentinel
Episode 1: Must Learn AI Security Series: Introduction
Must Learn AI Security Part 2: Data Poisoning Attacks Against AI
Using Azure AI Studio to Reduce Hallucinations
Permissions Required to Migrate to the New Simplified Pricing Model in Microsoft Sentinel
Quick Tip: Give Your Copilot a Personality
Quick Tip: Give Your Copilot a Name
How to Know When Data Retention Values Have Changed for Microsoft Sentinel
Must Learn AI Security Series: Introduction
Must Learn AI Security Part 1: Prompt Injection Attacks Against AI
Made by AI: A Modern Monty Python Skit Sketch
Basic Steps to Create Your Own Simple Copilot
Tip: Reset Your Wrecked Web App from the Azure OpenAI Chat Playground
KQL Queries Behind the Microsoft Sentinel Overview Page
Microsoft Sentinel Content Hub Changes
Track Major New Features for Microsoft Security Products Using RSS Feeds
Microsoft Sentinel What's New Page Now has an RSS Feed
Defender for Cloud Learn Doc Gets Its Own RSS Feed
Update now: Stop Running Playbooks Directly from Analytics Rules
Removing Deprecated Analytics Rules in Microsoft Sentinel
Getting GEO Information for IP Addresses without Using a Microsoft Sentinel Playbook
5 Signs that You're a Must Learn KQL Addict
Easy Way to Build KQL Query Templates for Azure Services
Must Learn KQL Part 20: Building Your First Microsoft Sentinel Analytics Rule
Must Learn KQL Part 19: The Join Operator
Must Learn KQL Part 18: The Union Operator
Must Learn KQL Part 17: The Let Statement
Must Learn KQL Part 16: The Order/Sort and Top Operators
Must Learn KQL Part 15: The Distinct Operator
Must Learn KQL Part 14: The Project Operator
Must Learn KQL Part 13: The Extend Operator
Must Learn KQL Part 12: The Render Operator
Must Learn KQL Part 11: The Summarize Operator
Must Learn KQL Part 10: The Count Operator
Must Learn KQL Part 9: The Limit and Take Operators
Must Learn KQL Part 8: The Where Operator
Must Learn KQL Part 7: Schema Talk
Must Learn KQL Part 6: Interface Intimacy
Must Learn KQL Part 5: Turn Search into Workflow
Must Learn KQL Part 4: Search for Fun and Profit
Must Learn KQL Part 3: Workflow
Must Learn KQL Part 2: Just Above Sea Level
Must Learn KQL Part 1: Tools and Resources
What Does Private Preview, Public Preview, and GA Mean?
Building Your own Conversational Copilot with Python, Flask, and Azure Open AI SDK
Monitor Azure Open AI Deployments with Microsoft Sentinel
Getting Responses to Questions from Azure Open AI ChatGPT in a CMD Window
Cross-workspace Query Best Practice for Microsoft Sentinel
An AI Way to Create XPath Queries for Microsoft Sentinel DCRs
Shortcut Way to Create XPath Queries for Microsoft Sentinel DCRs
Open Sourcing the Must Learn KQL Workshop Deck
Using Azure Open AI with Microsoft Sentinel Part 2 - Converting Data to JSONL
Using Azure Open AI with Microsoft Sentinel Part 1 - Getting Keys and Endpoints
Properly Setting Up the New MDTI Solution for Microsoft Sentinel
Generating KQL from Microsoft Sentinel Incidents with ChatGPT
Monitoring Updates to the Microsoft Sentinel GitHub Repo
Monitoring ChatGPT Usage in Microsoft Sentinel
Building Microsoft Sentinel Detections for Azure Open AI
Open Sourcing Discussions and Content for Responsible and Secure AI
Building a Better What's New Page for Microsoft Sentinel
Two New Features Sneak into the Microsoft Sentinel Incident Experience
How to Export and Import KQL Query Packs
Dipping a Toe into the Microsoft Sentinel Integration with GPT-3
Connecting Azure Active Directory to Microsoft Sentinel Through the Diagnostic Setting
How to Generate Microsoft Sentinel Incidents for Testing and Demos
Top New Incident Experience Features for Microsoft Sentinel
The Revoke Action for Threat Indicators in Microsoft Sentinel
How to Send Azure Storage Logs to Microsoft Sentinel
How to Quickly Tell Which Microsoft Sentinel Tables are Configured as Basic Logs
How to Get a List of Your Active Analytics Rules for Microsoft Sentinel
Using Logic App Parameters with Microsoft Sentinel Playbooks
How to Use a Playbook to Add Geographical Data for IP Addresses to a Microsoft Sentinel Incident
How to Query HaveIBeenPwned Using a Microsoft Sentinel Playbook
Viewing Microsoft Sentinel Rules with MITRE Tactics Directly in Excel
Alert When Microsoft Sentinel Daily Ingestion Reaches a Threshold
Is Moving the Sentinel Workspace to Another Resource Group or Subscription Supported?
How to Get the KQL Query Created by the New 365 Defender Query Builder
Building Microsoft Sentinel Incident Tasks Recipes
Building Your Own Potential Malicious Events Heatmap for Microsoft Sentinel
New Sentinel Role: Playbook Operator
Easy Way to Build KQL Query Templates for Azure Services
The Easy Way to Get the ARM Deployment Template for a Microsoft Sentinel Solution