PinnedAsjad AthickStuxnet — Reverse Engineering the most sophisticated Malware of its timeBackgroundNov 6, 2017Nov 6, 2017
Asjad AthickiTWire — Constant Evolution is the Key to Protecting your Data from Threat ActorsGUEST OPINION by Asjad Athick, Principal Security Specialist at Elastic: Whenever a major cybersecurity incident occurs, there are two…Jan 11, 2023Jan 11, 2023
Asjad AthickPreventing “copy-paste compromises” (ACSC 2020–008) with Elastic SecurityThe Australian Cyber Security Centre (ACSC) recently published an advisory outlining tactics, techniques, and procedures (TTPs) used…Feb 3, 2021Feb 3, 2021
Asjad AthickMonitoring your Amazon EKS Cluster with the Elastic StackTo achieve unified observability, we need to gather all of the logs, metrics, and application traces from an environment. Storing them in…Jun 22, 2020Jun 22, 2020
Asjad AthickHighlights from the 2018 Gartner Data Analytics Summit — SydneyData is at the core of modern technology. A successful data program means access to intelligence driven cyber security, data governance…Mar 2, 2018Mar 2, 2018
Asjad AthickKey takeaways from the 2017 Gartner Security Summit — SydneyI do apologise for all the buzzwords you’re going to read in this article. But then again, what’s the point of working in this industry if…Sep 28, 2017Sep 28, 2017