Automating Detection Coverage Analysis with ATT&CK Navigator
Staying on-top of the latest adversarial methodologies means quickly adjusting to new TTPs and...
Staying on-top of the latest adversarial methodologies means quickly adjusting to new TTPs and...
If you couldn't tell by now, we love Graylog. We may have mentioned them a time or two :)
We're thrilled to be accepted back to BlackHat to run our live-fire Network Defense Range (NDR)...
TL;DR - we needed to ingest multiple sources of Cylance logs into Graylog, and this is how we did...
I tweeted this the other day, and had a lot of folks reach out asking for more details/a diagram of...
After DEF CON last year, we posted this blog about our infrastructure, which was spread between a...
We never wrote up a blog post for DC27, but this excerpt from the closing ceremonies covers most of...
Part of our job at Recon relies on fine tuning our threat signatures that make up the bulk of our...
The Recon incident response team recently worked an intrusion case involving a Confluence web...
In a previous post, we shared our affinity for ZeroTier: