Posts by Amanda Berlin
About the Author
Amanda Berlin is Lead Incident Detection Engineer at Blumira, bringing nearly two decades of experience to her position. At Blumira she leads a team of incident detection engineers who are responsible for creating new detections based on threat intelligence and research for the Blumira platform. An accomplished author, speaker, and podcaster, Amanda is known for her ability to communicate complex technical concepts in a way that is accessible and engaging for audiences of all backgrounds. She co-authored an O’Reilly Media book Defensive Security Handbook: Best Practices for Securing Infrastructure, a comprehensive guide for starting an infosec program from the ground up. She has presented at various industry events, including Blueteam Con, RSA Conference, and DEFCON. She is also co-host of Brakeing Down Security, a podcast about the world of cybersecurity, privacy, compliance, and regulatory issues that arise in today’s workplace. Amanda is the CEO and co-founder of Mental Health Hackers, a non-profit organization that aims to raise awareness about mental health issues in the cybersecurity community. Through Mental Health Hackers, Amanda is working to break down the stigma surrounding mental health and create a supportive community for cybersecurity professionals. Passionate about educating others, Amanda frequently develops courses and leads tabletop sessions through organizations such as Antisyphon Training and Wild West Hackin’ Fest. Amanda is on multiple social media platforms as @InfoSystir, where she can be found sharing information security news, cracking jokes, and expressing her love for hedgehogs.
Security Detection Update – 2024-02-27
Read MoreIvanti Connect Secure VPN & Policy Secure Vulnerabilities
Read MoreWhy You Should Migrate From On-Premise Exchange
Read MoreMasked Application Attack Incident Report
Read MoreThe steps municipalities can take to prepare for rising cyberattacks
Read MoreDEF CON 31’s Top Security Talks for Mid-Sized Firms
Read MoreAuthentication Protocols 101: NTLM, Kerberos, LDAP and RADIUS
Read MoreHow To Detect SYSVOL Enumeration Exploits
Read MoreWhat Are Event Logs and Why Do They Matter?
Read MoreA Blue Teamer’s Bug Report
Read MoreBlumira’s SIEM Detection Rules Explained
Read MoreHow To Detect AS-REP Roasting With Blumira
Read MoreWhat To Log In A SIEM: Logging Best Practices
Read MoreBest Practices For Configuring Firewall Rules
Read MoreHow to Install & Configure Microsoft LAPS
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.