Graylog and Cylance Protect Integration Whitney Champion TL;DR - we needed to ingest multiple sources of Cylance logs into Graylog, and this is how we did...
Brokering Other Cloud Resources Behind AWS Services Whitney Champion I tweeted this the other day, and had a lot of folks reach out asking for more details/a diagram of...
Automating Graylog Pipelines Whitney Champion Part of our job at Recon relies on fine tuning our threat signatures that make up the bulk of our...
Analysis of Exploitation: CVE-2019-3396 Eric Capuano The Recon incident response team recently worked an intrusion case involving a Confluence web...
Securing G Suite Megan Roddie Shortly after publishing Part 1 of my G Suite DFIR blog series, I gave a talk on the topic at...