Posts by Amanda Berlin
About the Author
Amanda Berlin is the Senior Product Manager of Cybersecurity at Blumira, bringing nearly two decades of experience to her position. At Blumira she leads a team of incident detection engineers who are responsible for creating new detections based on threat intelligence and research for the Blumira platform. An accomplished author, speaker, and podcaster, Amanda is known for her ability to communicate complex technical concepts in a way that is accessible and engaging for audiences of all backgrounds. She co-authored an O’Reilly Media book Defensive Security Handbook: Best Practices for Securing Infrastructure, a comprehensive guide for starting an infosec program from the ground up. She has presented at various industry events, including Blueteam Con, RSA Conference, and DEFCON. She is also co-host of Brakeing Down Security, a podcast about the world of cybersecurity, privacy, compliance, and regulatory issues that arise in today’s workplace. Amanda is the CEO and co-founder of Mental Health Hackers, a non-profit organization that aims to raise awareness about mental health issues in the cybersecurity community. Through Mental Health Hackers, Amanda is working to break down the stigma surrounding mental health and create a supportive community for cybersecurity professionals. Passionate about educating others, Amanda frequently develops courses and leads tabletop sessions through organizations such as Antisyphon Training and Wild West Hackin’ Fest. Amanda is on multiple social media platforms as @InfoSystir, where she can be found sharing information security news, cracking jokes, and expressing her love for hedgehogs.

Security Detection Update – 2024-3-5
Read More
Real-World Examples of Detecting Attacks with Sysmon
Read More
Security Detection Update – 2024-02-27
Read More
Ivanti Connect Secure VPN & Policy Secure Vulnerabilities
Read More
Why You Should Migrate From On-Premise Exchange
Read More
Masked Application Attack Incident Report
Read More
The steps municipalities can take to prepare for rising cyberattacks
Read More
DEF CON 31’s Top Security Talks for Mid-Sized Firms
Read More
Authentication Protocols 101: NTLM, Kerberos, LDAP and RADIUS
Read More
How To Detect SYSVOL Enumeration Exploits
Read More
What Are Event Logs and Why Do They Matter?
Read More
A Blue Teamer’s Bug Report
Read More
Blumira’s SIEM Detection Rules Explained
Read More
How To Detect AS-REP Roasting With Blumira
Read More
What To Log In A SIEM: Logging Best Practices
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.