#threatdetection
![cover](https://lopes.id/images/graphic-logo-google-chronicle.png)
Auto-Cleaning Lists in Chronicle SIEM
Automate list maintenance in Chronicle SIEM by removing expired entries.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-spider-netadmin.jpg)
Endpoint Security Reflections feat. EDR and EDR-like Tools
Exploring the pros and cons of EDR and alternative endpoint solutions.
![cover](https://lopes.id/images/graphic-logo-misp.png)
Integrating MISP with Chronicle SIEM
Streamline the integration between CTI and CSIRT in an automated and efficient way.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-myth-buster.jpg)
Debunking Threat Detection Myths
Challenging myths in threat detection analytics for enhanced security operations.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-cooker-octopus.jpg)
Improving SecOps Beyond Tuning Analytics
![cover](https://lopes.id/images/illustration-ai-cyberpunk-thinking-atop-building.jpg)
The Threat Detection Fundamental Dilemma
Exploring the dilemma in threat detection: Precision vs. Recall for analytics.
![cover](https://lopes.id/images/graphic-logo-mitre-attack.jpg)
MITRE ATT&CK 101: Bridging the Gap
Guide to MITRE ATT&CK with history and context for better usage.
![cover](https://lopes.id/images/illustration-ai-compass-integrated-circuit.jpg)
Testing The Logfile Navigator
Exploring log analysis with lnav tool: challenges, insights, and tips.
![cover](https://lopes.id/images/graphic-logo-mitre-attack.jpg)
Getting Real About MITRE ATT&CK
Understanding MITRE ATT&CK and using it in your favor.
Understanding Severity and Priority
Uncover optimal Detection Rule settings for consistent, efficient alerts.
![cover](https://lopes.id/images/graphic-book-intel-driven-ir.jpg)
Intelligence-Driven Incident Response
Discover how integrating CTI enhances Threat Detection and CSIRT.
Effective Detection Rules for Net and Port Scans
Effective network and port scan detection.