Search Skills
Search across 54932 indexed skills
detecting-aws-credential-exposure-with-trufflehog
When integrating secrets detection into CI/CD pipelines to prevent credential commits reaching production When performing a security audit of existing...
deploying-cloudflare-access-for-zero-trust
When replacing VPN infrastructure with identity-aware application access using Cloudflare One When exposing self-hosted internal applications through ...
deploying-decoy-files-for-ransomware-detection
Setting up early-warning detection for ransomware on file servers or endpoints Supplementing EDR/AV with a deception-based detection layer that catche...
deploying-osquery-for-endpoint-monitoring
Use this skill when: Deploying osquery across Windows, macOS, and Linux endpoints for fleet-wide visibility Building threat hunting queries using osqu...
detecting-azure-lateral-movement
Lateral movement in Azure AD/Entra ID differs from on-premises environments. Attackers pivot through OAuth application consent grants, service princip...
detecting-beaconing-patterns-with-zeek
When investigating security incidents that require detecting beaconing patterns with zeek When building detection rules or threat hunting queries for ...
detecting-business-email-compromise-with-ai
AI-powered BEC detection uses machine learning, NLP, and behavioral analytics to identify sophisticated impersonation attacks that contain no maliciou...
implementing-aws-nitro-enclave-security
Processing sensitive data (PII, PHI, financial records, cryptographic secrets) that must be isolated from EC2 instance operators and administrators Bu...
implementing-cloud-vulnerability-posture-management
Cloud Security Posture Management (CSPM) continuously monitors cloud infrastructure for misconfigurations, compliance violations, and security risks. ...
implementing-container-image-minimal-base-with-distroless
Google distroless images contain only your application and its runtime dependencies, without package managers, shells, or other programs found in stan...
implementing-ddos-mitigation-with-cloudflare
Cloudflare provides multi-layer DDoS protection across its global network of over 300 data centers with 477+ Tbps of capacity. The platform protects a...
hunting-for-command-and-control-beaconing
When proactively hunting for compromised systems in the network After threat intel indicates C2 frameworks targeting your industry When investigating ...