Where every claim in SecProve
comes from.
A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.
Official guide to effective prompt engineering with Claude. Covers system prompts, chain-of-thought, few-shot examples, and best practices.
Test your knowledge · B8Generic signature format for SIEM systems. Documentation on writing, testing, and deploying detection rules.
Test your knowledge · B8Techniques for effective prompting including for safety and security use cases. Covers system prompts, chain-of-thought, and reducing hallucination.
Test your knowledge · B8Open-source detection rules for Elastic Security. Covers a wide range of attack techniques mapped to MITRE ATT&CK.
Test your knowledge · B1Official guidance on prompt construction, system prompts, and safety. The baseline for understanding prompt engineering before adding security-specific techniques.
Test your knowledge · B8Practitioner-oriented guide to using LLMs in security workflows: log analysis, detection rule writing, incident triage, report generation. Practical prompt templates for security tasks.
Test your knowledge · B8Comprehensive taxonomy of 58+ prompting techniques with effectiveness analysis. Covers chain-of-thought, few-shot, self-consistency, and adversarial prompting. Academic grounding for prompt engineering questions.
Test your knowledge · B8Ready to test what you've learned?
Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.