How DNIF Makes it easy to analyse complex log data
Security incidents are becoming more common and complex, putting immense pressure on ...
Why cost is a barrier to good THREAT detection
It was Q3 of 2018, when we were running surveys across the globe, talking to analysts and ...
Cyber Attack on AIIMS: Crucial lessons to be learned
Cyber attacks have become an increasingly common threat to organizations around the ...
What are the best measures to avoid APT attacks?
Advanced persistent threats (APTs) are cyber attacks that have the potential to cause the ...
Steps to Develop custom rules and alerts based on MITRE ATT&CK techniques and tactics
MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, ...
Using MITRE ATT&CK to enhance threat hunting and incident response
The MITRE ATT&CK framework is a widely-used threat modeling and analysis framework ...
What is ransomware and how does it work?
Ransomware is a type of malicious software or malware that restricts access to computer ...
Opinion - Short term log retention has a problem
IMHO Retention of log events has not been discussed enough. In my interaction with ...
Threat Hunting: Methodologies, Tools, and Tips
Threat hunting is the practice of proactively and continuously searching for cyber ...