- ADRecon
- APT Attacks
- Authentication
- BESTPRACTICES
- CASESTUDY
- CISO
- cloud native SIEM
- Cloud Security
- CLOUD SECURITY MONITORING
- compliance reporting
- Cyber Attack
- Cyber Security
- DARC Notes
- DETECTION
- DISCUSSION
- INDUSTRY SOLUTION
- LDAP
- MITRE ATT&CK
- MITRE Mapped SIEM Solution
- Modern SIEM Solution
- NGINX
- on-premise SIEM
- Security Analytics
- SIEM
- SIEM Solutions
- SOAR
- SOC
- threat analysis
- threat detection
- THREAT HUNTING
- threat intelligence
- THREATPOST
- UEBA
Announcement: DNIF Query Language Support Added to Sigma Rules
We are happy to share that our engineering team has contributed a translation backend for ...
What is Magniber Ransomware and How to Detect it
Magniber is a ransomware program that infects systems by exploiting vulnerabilities in ...
Return of BlackByte Ransomware
On February 11, 2022, FBI and Unites States Secret Service (USSS) released a joint ...
Understanding Machine Data and its relevance to Security
How SIEM Supports Compliance & Regulatory Requirements
Table of Content Introduction How does SIEM work? How can SIEM be used for Compliance ...
Importance of SIEM in Supporting Digital Transformation Initiatives
Digital transformation is a key driver of business growth and competitiveness in today's ...
Protect your Active Directory from Admin SDHolder Attack
Google Drive Monitoring with DNIF HYPERCLOUD
Google Workspace comprises a number of cloud-based productivity and collaboration tools ...
The impact of the cloud on the future of SIEM
Security Information and Event Management (SIEM) is a critical component of an ...
How to use SIEM to gain visibility & control over your network
Table of Content
Optimizing Cloud SIEM to Monitor & Respond to Security Threats
Cloud SIEM, or Security Information and Event Management, is a powerful tool that can ...
A comparison of On-premises SIEM vs. Cloud SIEM
Table of Content Introduction What is an on-premises SIEM and Cloud SIEM? Key Differences ...