PinnedAsjad AthickStuxnet — Reverse Engineering the most sophisticated Malware of its timeBackground6 min read·Nov 6, 2017----
Asjad AthickiTWire — Constant Evolution is the Key to Protecting your Data from Threat ActorsGUEST OPINION by Asjad Athick, Principal Security Specialist at Elastic: Whenever a major cybersecurity incident occurs, there are two…5 min read·Jan 11, 2023----
Asjad AthickPreventing “copy-paste compromises” (ACSC 2020–008) with Elastic SecurityThe Australian Cyber Security Centre (ACSC) recently published an advisory outlining tactics, techniques, and procedures (TTPs) used…6 min read·Feb 3, 2021----
Asjad AthickMonitoring your Amazon EKS Cluster with the Elastic StackTo achieve unified observability, we need to gather all of the logs, metrics, and application traces from an environment. Storing them in…5 min read·Jun 22, 2020----
Asjad AthickHighlights from the 2018 Gartner Data Analytics Summit — SydneyData is at the core of modern technology. A successful data program means access to intelligence driven cyber security, data governance…5 min read·Mar 2, 2018----
Asjad AthickKey takeaways from the 2017 Gartner Security Summit — SydneyI do apologise for all the buzzwords you’re going to read in this article. But then again, what’s the point of working in this industry if…5 min read·Sep 28, 2017----