Splunk
654,257 followers
- Report this post
Find known, unknown and hidden threats with a UEBA solution–and keep your SOC running smoothly (and happily).
11
To view or add a comment, sign in
More Relevant Posts
-
Elite Paradigm LLC
235 followers
- Report this post
The most effective way to secure your organization from attacks is with full visibility and laser-accurate analytics. @Palo Alto Networks Cortex XDR solution provides comprehensive protections for endpoint attacks, including the new Log4j (aka Log4Shell) vulnerability.Read the blog to learn more about Cortex #XDR: the world's 1st extended detection & response platform, and DM a ELITE PARADIGM expert to learn how XDR 3.0 helps prevent, detect, & neutralize threats. #securitytalent #Log4j
Like CommentTo view or add a comment, sign in
-
Twente University Centre for Cybersecurity Research - TUCCR
340 followers
- Report this post
Security monitoring systems detect potentially malicious activities in IT infrastructures, by either looking for known signatures or for anomalous behaviors. Security operators investigate these events to determine whether they pose a threat to their organization. In many cases, a single event may be insufficient to determine whether certain activity is indeed malicious. Therefore, a security operator frequently needs to correlate multiple events to identify if they pose a real threat. Unfortunately, the vast number of events that need to be correlated often overload security operators, forcing them to ignore some events and, thereby, potentially miss attacks. Thijs van Ede will tell more about his research on DeepCASE during SECCON2023Sign up for Thijs' talk and many more interesting presentations via https://lnkd.in/ePZKGSGehttps://lnkd.in/egPSESKV
SECCON NL - Thijs van Ede - DeepCASE: Contextual Analysis of Security Events https://www.youtube.com/
13
Like CommentTo view or add a comment, sign in
-
Fastly
52,986 followers
- Report this post
The #RapidReset DDoS attack did not affect Fastly traffic. Want to know why?Our protections for massive scale attacks are handled at the #edge automatically with detection and defense capabilities that are built-in, helping protect customer traffic on Fastly’s platform i from these attacks.Our latest blog explains how we are able to detect and defend against novel attacks and mitigate them within seconds for Fastly customers: https://fastly.us/3QtRYju
30
1 Comment
Like CommentTo view or add a comment, sign in
-
Tomasz Szepelak
Sr End User Support Engineer, GE Power
- Report this post
Hey Everyone, we're starting another weekend with #tryhackme. In my opinion, the next interesting room 'Threat Intelligence for SOC,' is completed. In this room, you will learn how to utilise Threat Intelligence to improve the Security Operations pipeline. You should do this room.
1
Like CommentTo view or add a comment, sign in
-
Ahmed Mohamed
Cyber Incident Analyst | Soc Analyst | Help Desk | Bug Hunter
- Report this post
Congratulations! You have completed the investigation task.In the simulated threat investigation activity, we have learned the following:Having a baseline document aids you in differentiating malicious events from benign ones.Event correlation provides a deeper understanding of the concurrent events triggered by the malicious activity.Taking note of each significant artefact is crucial in the investigation.Other potentially affected assets should be inspected and remediated using the collected malicious artefacts.
Like CommentTo view or add a comment, sign in
-
Azim Uddin
Security Engineer @ Pipeline Co., Ltd. | Incident Response | Malware Analysis | SIEM | EDR | Threat Modeling | Purple Teaming
- Report this post
Days of 110 #365daysofinfosecThreat Intelligence for SOC from TryHackMeLearn how to utilise Threat Intelligence to improve the Security Operations pipeline fig: Domain Blocking throughDNSSinkhole
12
Like CommentTo view or add a comment, sign in
-
Anthony O.
Committed to the Security of your Enterprise Infrastructure. Load Balancing, WAF, ADC, and Troubleshooting issues. Decades of advanced networking experience!
- Report this post
Prepare. Maintain. Detect. Respond. Having a #cyber-readiness framework is crucial for modern organizations to safeguard against potential attacks. Learn valuable tips on how to establish one: http://ftnt.me/2E318F
Like CommentTo view or add a comment, sign in
-
Dikky Ryan Pratama
Alibaba Cloud MVP | Microsoft Certified Trainer | Offensive Security
- Report this post
Threat Intelligence for SOCLearn how to utilise Threat Intelligence to improve the Security Operations pipeline.Room : https://lnkd.in/gqzGFtsX#tryhackme #thm #security #pipeline #intelligence #soc
10
Like CommentTo view or add a comment, sign in
-
UC Solutions
6,067 followers
- Report this post
Prepare. Maintain. Detect. Respond. Having a #cyber-readiness framework is crucial for modern organizations to safeguard against potential attacks. Learn valuable tips on how to establish one: http://ftnt.me/8D4072
7
Like CommentTo view or add a comment, sign in
-
Infoblox
149,190 followers
- Report this post
With #DNS Detection and Response, we can see attacker infrastructure & block suspicious activity before attacks happen. Just one of the ways we reduce your Mean Time To Respond (MTTR). Learn More:#DNSMTTRs #MTTR #weDNeSweekly
46
Like CommentTo view or add a comment, sign in
654,257 followers
View Profile
Follow