Posts tagged Detection and Response

Products and Tools
Velociraptor Version 0.6.3: Dig Deeper With More Speed and Scalability
Carlos Canto

Detection and Response
Demystifying XDR: Where SIEM and XDR Collide
Jesse Mack

Security Operations
2021 Cybersecurity Superlatives: An InsightIDR Year in Review
KJ McCann

Detection and Response
Evaluating MDR Vendors: A Pocket Buyer's Guide
Mikayla Wyman

Detection and Response
Demystifying XDR: How Humans and Machines Join Forces in Threat Response
Jesse Mack

Products and Tools
Demystifying XDR: A Forrester Analyst Lays the Foundation
Jesse Mack

Security Operations
Building Threat-Informed Defenses: Rapid7 Experts Share Their Thoughts on MITRE ATT&CK
Margaret Wei

Detection and Response
4 Simple Steps for an Effective Threat Intelligence Program
Alon Arvatz

Detection and Response
Velociraptor to Announce Winners of Its 2021 Contributor Competition
Carlos Canto

Products and Tools
What's New in InsightIDR: Q3 2021 in Review
Margaret Wei
![[The Lost Bots] Episode 6: D&R + VM = WINNING!](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblte737439b4692afc9%2F683ddc0c2a9b683ac62bd0fc%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.jpeg%3Fauto%3Davif&w=1920&q=75)
Exposure Management
[The Lost Bots] Episode 6: D&R + VM = WINNING!
Rapid7

Threat Research
SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal
Margaret Wei

Detection and Response
Cybersecurity as Digital Detective Work: DFIR and Its 3 Key Components
Jesse Mack
![[The Lost Bots] Episode 4: Deception Technology](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblte737439b4692afc9%2F683ddc0c2a9b683ac62bd0fc%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.jpeg%3Fauto%3Davif&w=1920&q=75)
Detection and Response
[The Lost Bots] Episode 4: Deception Technology
Rapid7
![[R]Evolution of the Cyber Threat Intelligence Practice](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblt592172d301c58fbb%2F683ddd9aff6aa96fdc0ea772%2Fevolution-threat-intelligence.jpg%3Fauto%3Davif&w=1920&q=75)
Threat Research
[R]Evolution of the Cyber Threat Intelligence Practice
Alon Arvatz
![[The Lost Bots] Episode 3: Stories From the SOC](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblte737439b4692afc9%2F683ddc0c2a9b683ac62bd0fc%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.jpeg%3Fauto%3Davif&w=1920&q=75)
Detection and Response
[The Lost Bots] Episode 3: Stories From the SOC
Rapid7

Exposure Management
When One Door Opens, Keep It Open: A New Tool for Physical Security Testing
Ted Raffle

Detection and Response
Slot Machines and Cybercrime: Why Ransomware Won't Quit Pulling Our Lever
Erick Galinkin

Exposure Management
The Ransomware Task Force: A New Approach to Fighting Ransomware
Jen Ellis

Industry Trends
Why the Robot Hackers Aren’t Here (Yet)
Erick Galinkin

Industry Trends
Introducing the Manual Regex Editor in IDR’s Parsing Tool: Part 2
Teresa Copple