Detecting Threats with Graylog Pipelines - Part 2
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...
At Recon InfoSec we have the honor of working with some of the best security operations, incident...
Much has already been said about the recently reported SolarWinds compromise. In this post, we are...
Whether you're on the Defensive or Offensive side of security, it's important to understand how...
The Recon team is excited to announce the launch of SOC X™, the Professional SOC Team World...
The Recon team is thrilled to announce our newest offering, NDR Live Online!
Our team are huge fans of Velociraptor. It's an incredibly powerful tool, for both DFIR and...
The Center for Threat-Informed Defense at MITRE recently released their Adversary Emulation Plans...
We've been big fans of the Thinkst platform for a while now. We may have mentioned them a time or...