Heyo! I'm David - A Cloud Threat Detection specialist with about 14 years of Enterprise IT Experience and have built out a few Security Monitoring programs now at various Managed Security Service Providers. Through the years, I've always felt that too many topics within the Information Security realm really didn't have many guides out there on how to actually implement various programs.

While that is definitely starting to change, I thought I'd write about some of the things I wish I knew along the way as well as some of the lessons learned through building said security monitoring programs.

Find my blog helpful? Consider subscribing!



Detectors as Code
The Challenge of Detector Management Security operations and monitoring teams face a variety of challenges: the rapid evolution of adversarial tradecraft, poor detector documentation, lack of detector version control, poor detection methodology, lack of testing procedures, and change control proce…

Social Media




You've successfully subscribed to signalblur
Great! Next, complete checkout for full access to signalblur
Welcome back! You've successfully signed in.
Unable to sign you in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Error! Stripe checkout failed.
Success! Your billing info is updated.
Error! Billing info update failed.