Scaling Enterprise Forensic Timelining
In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...
In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...
Whether your cybersecurity detection and response capabilities are in-house or managed through a...
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...
Much has already been said about the recently reported SolarWinds compromise. In this post, we are...
Our team are huge fans of Velociraptor. It's an incredibly powerful tool, for both DFIR and...
TL;DR - we needed to ingest multiple sources of Cylance logs into Graylog, and this is how we did...
I tweeted this the other day, and had a lot of folks reach out asking for more details/a diagram of...
Running a Security Operations Center requires fighting a constant battle to increase analyst...