Posts tagged Detection and Response

Introducing the Manual Regex Editor in IDR’s Parsing Tool: Part 1

Industry Trends

Introducing the Manual Regex Editor in IDR’s Parsing Tool: Part 1

Teresa Copple's avatar

Teresa Copple

Rapid7 Named a Leader, 2021 Gartner Magic Quadrant for SIEM

Detection and Response

Rapid7 Named a Leader, 2021 Gartner Magic Quadrant for SIEM

Meaghan Buchanan's avatar

Meaghan Buchanan

Automated remediation level 4: Actual automation

Exposure Management

Automated remediation level 4: Actual automation

Aaron Wells's avatar

Aaron Wells

Automated remediation level 3: Governance and hygiene

Exposure Management

Automated remediation level 3: Governance and hygiene

Aaron Wells's avatar

Aaron Wells

Kill Chains: Part 3→What’s next

Detection and Response

Kill Chains: Part 3→What’s next

Jeffrey Gardner's avatar

Jeffrey Gardner

CVE-2021-20025: SonicWall Email Security Appliance Backdoor Credential

Vulnerabilities and Exploits

CVE-2021-20025: SonicWall Email Security Appliance Backdoor Credential

Tod Beardsley's avatar

Tod Beardsley

Automated remediation level 2: Best practices

Exposure Management

Automated remediation level 2: Best practices

Aaron Wells's avatar

Aaron Wells

Automated remediation level 1: Lock down fundamentals

Exposure Management

Automated remediation level 1: Lock down fundamentals

Aaron Wells's avatar

Aaron Wells

Kill Chains: Part 2→Strategic and tactical use cases

Detection and Response

Kill Chains: Part 2→Strategic and tactical use cases

Jeffrey Gardner's avatar

Jeffrey Gardner

Kill Chains: Part 1→Strategic and operational value

Security Operations

Kill Chains: Part 1→Strategic and operational value

Jeffrey Gardner's avatar

Jeffrey Gardner

Want to stay ahead of emerging threats? Here’s how.

Detection and Response

Want to stay ahead of emerging threats? Here’s how.

Aaron Wells's avatar

Aaron Wells

Top Challenges for Security Analytics and Operations, and How a Cloud-Based SIEM Can Help

Detection and Response

Top Challenges for Security Analytics and Operations, and How a Cloud-Based SIEM Can Help

Margaret Wei's avatar

Margaret Wei

MDR Vendor Must-Haves, Part 9: Assigned Analyst Pods and Security Program Advisors

Products and Tools

MDR Vendor Must-Haves, Part 9: Assigned Analyst Pods and Security Program Advisors

Jake Godgart's avatar

Jake Godgart

MDR Vendor Must-Haves, Part 8: Rapid7 Incident Response (Breach) Support

Products and Tools

MDR Vendor Must-Haves, Part 8: Rapid7 Incident Response (Breach) Support

Jake Godgart's avatar

Jake Godgart

MDR Vendor Must-Haves, Part 7: Managed Response Actions

Products and Tools

MDR Vendor Must-Haves, Part 7: Managed Response Actions

Jake Godgart's avatar

Jake Godgart

MDR Vendor Must-Haves, Part 4: Ingestion of Authentication Data Across Local, Domain, and Cloud Sources

Products and Tools

MDR Vendor Must-Haves, Part 4: Ingestion of Authentication Data Across Local, Domain, and Cloud Sources

Jake Godgart's avatar

Jake Godgart

MDR Vendor Must-Haves, Part 2: Ingestion of Network Device Data

Products and Tools

MDR Vendor Must-Haves, Part 2: Ingestion of Network Device Data

Jake Godgart's avatar

Jake Godgart

Attack vs. Data: What You Need to Know About Threat Hunting

Products and Tools

Attack vs. Data: What You Need to Know About Threat Hunting

Jeffrey Gardner's avatar

Jeffrey Gardner

Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange

Products and Tools

Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange

Eoin Miller's avatar

Eoin Miller

SOC Automation with InsightIDR and InsightConnect

Products and Tools

SOC Automation with InsightIDR and InsightConnect

Sydney Coffaro's avatar

Sydney Coffaro

InsightIDR’s NTA Capabilities Expanded to AWS

Products and Tools

InsightIDR’s NTA Capabilities Expanded to AWS

Aaron Sawitsky's avatar

Aaron Sawitsky