top of page


The Big Data Blog


Detecting Time Manipulation in Windows — You Don't Always Need Full Forensics
Okay so if you've been following along, I've already written about timestomping and time manipulation from a forensics angle — both for Linux and Windows. Links below if you missed those: Linux: https://www.cyberengage.org/post/timestomping-in-linux-techniques-detection-and-forensic-insights Windows: https://www.cyberengage.org/post/anti-forensics-timestomping But today I want to talk about something a little different. What if you didn't have to go full forensics mode to cat
Mar 194 min read


Identity and Access Management in Google Cloud
When setting up Google Cloud, one of the first and most important decisions an organization must make is how authentication and user management will be handled . Google Cloud provides two primary, native approaches for managing identities and authentication: Cloud Identity and Google Workspace . Cloud Identity is Google Cloud’s standalone IAM service and is typically used when an organization does not rely on Google Workspace for email and collaboration. Google Workspace ,
Mar 176 min read


Meet the CE SentinelOne Assistant — I Built It for Myself, But You Can Try It Too
⚡ CE S1 Assistant So, Why Did I Build This? Let me be real with you — I built this tool for myself. That’s it. No grand master plan, no startup pitch deck. Just a guy who got tired of the same problem every single time he opened SentinelOne Deep Visibility. If you’ve ever used Deep Visibility, you know exactly what I’m talking about. You get an alert, you need to hunt across your endpoints fast , and you open that q
Mar 147 min read


How a Single Behavioral Indicator in SentinelOne Uncovered a Full Infostealer Attack
Okay, I know — another SentinelOne article. But hear me out. What I'm about to show you changed how you think about detection engineering, and I genuinely can't stop thinking about it. If you've been following this series, you already know I covered the Detection Center in the last article. https://www.cyberengage.org/post/sentinelone-detection-center-library-rules-emerging-threats-and-what-it-all-actually-means Go check that one out if you haven't — link at the top. But tod
Mar 102 min read


Browser Forensics Just Got Way Easier — And It's Free
Okay let me be real with you for a second. Browser forensics manually? It's a pain. You're digging through SQLite databases, remembering artifact locations, writing queries — and if you're doing it with free tools, it only gets worse. I actually built a full series on how to do this manually if you want to go deep on it — link here: https://www.cyberengage.org/courses-1/introducing%3A-browser-forensics-%E2%80%93-your-ultimate-guide-to-manual-analysis But today? I found a tool
Mar 72 min read
Ready to discuss:
- Schedule a call for a consultation
- Message me via "Let's Chat" for quick questions
Let's connect!
bottom of page