- ADRecon
- APT Attacks
- Authentication
- BESTPRACTICES
- CASESTUDY
- CISO
- cloud native SIEM
- Cloud Security
- CLOUD SECURITY MONITORING
- compliance reporting
- Cyber Attack
- Cyber Security
- DARC Notes
- DETECTION
- DISCUSSION
- INDUSTRY SOLUTION
- LDAP
- MITRE ATT&CK
- MITRE Mapped SIEM Solution
- Modern SIEM Solution
- NGINX
- on-premise SIEM
- Security Analytics
- SIEM
- SIEM Solutions
- SOAR
- SOC
- threat analysis
- threat detection
- THREAT HUNTING
- threat intelligence
- THREATPOST
- UEBA
The need to regularly review the effectiveness of selected SIEM
As organizations increasingly rely on technology to support their operations and protect ...
Understanding Machine Data and its relevance to Security
Protect your Active Directory from Admin SDHolder Attack
An Introduction to Security Analytics
Enterprises cannot predict the future, particularly when security threats are involved. ...
How to Build a SOC : Your SOC Quick Start Guide
Cybersecurity threats are now more common, dangerous, and difficult to detect and defend. ...
NGINX Zero Day - LDAP Reference Implementation Vulnerability
Timeline -
Top Threat Detection Strategies for Fintech Companies
A recent trend has seen organisations leveraging cloud for their critical workloads. ...
Four Lessons Learned From the Log4j Vulnerability
Log4j is a Java-based software library used for login purposes. It is widely used by ...
Best Practices to Manage Your SIEM Content
The basic foundation of security monitoring, detection and response depends on the ...