#threatdetection

cover

Auto-Cleaning Lists in Chronicle SIEM

Automate list maintenance in Chronicle SIEM by removing expired entries.

· 9min · Joe Lopes
Auto-Cleaning Lists in Chronicle SIEM
cover

Endpoint Security Reflections feat. EDR and EDR-like Tools

Exploring the pros and cons of EDR and alternative endpoint solutions.

· 8min · Joe Lopes
Endpoint Security Reflections feat. EDR and EDR-like Tools
cover

Integrating MISP with Chronicle SIEM

Streamline the integration between CTI and CSIRT in an automated and efficient way.

· 15min · Joe Lopes
Integrating MISP with Chronicle SIEM
cover

Debunking Threat Detection Myths

Challenging myths in threat detection analytics for enhanced security operations.

· 4min · Joe Lopes
Debunking Threat Detection Myths
cover

Improving SecOps Beyond Tuning Analytics

· 5min · Joe Lopes
Improving SecOps Beyond Tuning Analytics
cover

The Threat Detection Fundamental Dilemma

Exploring the dilemma in threat detection: Precision vs. Recall for analytics.

· 8min · Joe Lopes
The Threat Detection Fundamental Dilemma
cover

MITRE ATT&CK 101: Bridging the Gap

Guide to MITRE ATT&CK with history and context for better usage.

· 10min · Joe Lopes
MITRE ATT&CK 101: Bridging the Gap
cover

Testing The Logfile Navigator

Exploring log analysis with lnav tool: challenges, insights, and tips.

· 6min · Joe Lopes
Testing The Logfile Navigator
cover

Getting Real About MITRE ATT&CK

Understanding MITRE ATT&CK and using it in your favor.

· 4min · Joe Lopes
Getting Real About MITRE ATT&CK

Understanding Severity and Priority

Uncover optimal Detection Rule settings for consistent, efficient alerts.

· 3min · Joe Lopes
Understanding Severity and Priority
cover

Intelligence-Driven Incident Response

Discover how integrating CTI enhances Threat Detection and CSIRT.

· 4min · Joe Lopes
Intelligence-Driven Incident Response

Effective Detection Rules for Net and Port Scans

Effective network and port scan detection.

· 7min · Joe Lopes
Effective Detection Rules for Net and Port Scans