4 min
Incident Detection
Introspective Intelligence: What Makes Your Network Tick, What Makes It Sick?
In my last blog post
[/2016/11/16/introspective-intelligence-understanding-detections], we reviewed
the most prevalent detection strategies and how we can best implement them. This
post dives into understanding how to catch what our other systems missed, using
attacker behavior analytics and anomaly detection to improve detection.
Understand Your Adversary – Attack Methodology Detection
Contextual intelligence feeds introduce higher fidelity and the details needed
to gain insight into patterns
3 min
Incident Detection
Introspective Intelligence: Understanding Detection Techniques
To provide insight into the methods devised by Rapid7, we'll need to revisit the
detection methods implemented across InfoSec products and services and how we
apply data differently. Rapid7 gathers volumes of threat intelligence on a daily
basis - from new penetration testing tools
[https://www.rapid7.com/products/metasploit/download.jsp?CS=blog], tactics, and
procedures in Metasploit
[https://www.rapid7.com/products/metasploit/index.jsp?CS=blog], vulnerability
detections in Nexpose [https://www