- ADRecon
- APT Attacks
- Authentication
- BESTPRACTICES
- CASESTUDY
- CISO
- cloud native SIEM
- Cloud Security
- CLOUD SECURITY MONITORING
- compliance reporting
- Cyber Attack
- Cyber Security
- DARC Notes
- DETECTION
- DISCUSSION
- INDUSTRY SOLUTION
- LDAP
- MITRE ATT&CK
- MITRE Mapped SIEM Solution
- Modern SIEM Solution
- NGINX
- on-premise SIEM
- Security Analytics
- SIEM
- SIEM Solutions
- SOAR
- SOC
- threat analysis
- threat detection
- THREAT HUNTING
- threat intelligence
- THREATPOST
- UEBA
Understanding Machine Data and its relevance to Security
Protect your Active Directory from Admin SDHolder Attack
Opinion - Short term log retention has a problem
IMHO Retention of log events has not been discussed enough. In my interaction with ...
An Introduction to Security Analytics
Enterprises cannot predict the future, particularly when security threats are involved. ...
How to Build a SOC : Your SOC Quick Start Guide
Cybersecurity threats are now more common, dangerous, and difficult to detect and defend. ...
NGINX Zero Day - LDAP Reference Implementation Vulnerability
Timeline -
Top Threat Detection Strategies for Fintech Companies
A recent trend has seen organisations leveraging cloud for their critical workloads. ...
Four Lessons Learned From the Log4j Vulnerability
Log4j is a Java-based software library used for login purposes. It is widely used by ...
Best Practices to Manage Your SIEM Content
The basic foundation of security monitoring, detection and response depends on the ...