Planning for the Worst: Making IR, BC, and DR Plans Work
Organizations know they should have plans for cyber incidents, but too often those plans are...
Organizations know they should have plans for cyber incidents, but too often those plans are...
In today’s rapidly evolving cyber threat landscape, proactive defense is no longer optional—it’s...
In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...
Whether your cybersecurity detection and response capabilities are in-house or managed through a...
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...
Much has already been said about the recently reported SolarWinds compromise. In this post, we are...
Our team are huge fans of Velociraptor. It's an incredibly powerful tool, for both DFIR and...