Alex TeixeiraSecurity Analytics: How to rank use cases based on the "Quick Wins" approach?When planning for a Security Monitoring project, no matter if it’s a rule that triggers alerts or an interactive dashboard to support…Apr 18, 20172Apr 18, 20172
Cyborg SecurityHow to Threat Hunt: A Beginner’s GuideBy Josh Campbell at Cyborg SecurityApr 8, 2021Apr 8, 2021
InBlu RavenbyMehmet ErgeneThreat Hunting and Detection with Web Proxy LogsAs I mentioned in my "detecting and responding to ransomware attacks" post, I created a hunting and detection guide using proxy logs…Aug 12, 20201Aug 12, 20201