Detecting Threats with Graylog Pipelines - Part 3
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...
At Recon InfoSec we have the honor of working with some of the best security operations, incident...
Whether you're on the Defensive or Offensive side of security, it's important to understand how...
The Recon team is excited to announce the launch of SOC X™, the Professional SOC Team World...
The Recon team is thrilled to announce our newest offering, NDR Live Online!
Our team are huge fans of Velociraptor. It's an incredibly powerful tool, for both DFIR and...
We've been big fans of the Thinkst platform for a while now. We may have mentioned them a time or...
The Recon incident response team recently worked an intrusion case involving a ManageEngine Desktop...