Posts tagged Detection and Response

Top 5 Ways to Get a Network Traffic Source on Your Network

Detection and Response

Top 5 Ways to Get a Network Traffic Source on Your Network

Darragh Delaney's avatar

Darragh Delaney

What You Need to Know About Cloud SIEM Deployment and Configuration

Detection and Response

What You Need to Know About Cloud SIEM Deployment and Configuration

Meaghan Buchanan's avatar

Meaghan Buchanan

Rapid7 Named a 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management

Detection and Response

Rapid7 Named a 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management

Meaghan Buchanan's avatar

Meaghan Buchanan

How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response

Detection and Response

How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response

Darragh Delaney's avatar

Darragh Delaney

SIEM Security Tools: Six Expensive Misconceptions

Detection and Response

SIEM Security Tools: Six Expensive Misconceptions

Eric Sun's avatar

Eric Sun

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

Products and Tools

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

matthew berninger's avatar

matthew berninger

5 Challenges Outsourced Detection and Response Operations Can Help Solve

Products and Tools

5 Challenges Outsourced Detection and Response Operations Can Help Solve

Ellis Fincham's avatar

Ellis Fincham

How InsightIDR Is Accelerating Detection and Response in Modern Environments

Detection and Response

How InsightIDR Is Accelerating Detection and Response in Modern Environments

Margaret Wei's avatar

Margaret Wei

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Detection and Response

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Wade Hickey's avatar

Wade Hickey

Analyze Security Data Faster with Visual Search in InsightIDR

Detection and Response

Analyze Security Data Faster with Visual Search in InsightIDR

Meaghan Buchanan's avatar

Meaghan Buchanan

3 Common Threats to Look for in Your Network Data

Detection and Response

3 Common Threats to Look for in Your Network Data

Darragh Delaney's avatar

Darragh Delaney

Intro to the SOC Visibility Triad

Detection and Response

Intro to the SOC Visibility Triad

Meaghan Buchanan's avatar

Meaghan Buchanan

How to Analyze Your Log Data Using the Log Search API in InsightIDR

Detection and Response

How to Analyze Your Log Data Using the Log Search API in InsightIDR

Eoin Shanley's avatar

Eoin Shanley

InsightIDR: 2019 Year in Review

Products and Tools

InsightIDR: 2019 Year in Review

Meaghan Buchanan's avatar

Meaghan Buchanan

10 Threat Detection and Response Resolutions for 2020

Detection and Response

10 Threat Detection and Response Resolutions for 2020

Wade Woolwine's avatar

Wade Woolwine

We Don’t Want White Font: Office Macros, Evasion, and Malicious Self-Reference

Detection and Response

We Don’t Want White Font: Office Macros, Evasion, and Malicious Self-Reference

Wade Hickey's avatar

Wade Hickey

Be Audit You Can Be, Part 2: How to Parse Out Fields in Your Logs

Detection and Response

Be Audit You Can Be, Part 2: How to Parse Out Fields in Your Logs

Teresa Copple's avatar

Teresa Copple

Unlocking the Power of the InsightIDR Threat API, Part 2

Products and Tools

Unlocking the Power of the InsightIDR Threat API, Part 2

Teresa Copple's avatar

Teresa Copple

Be Audit You Can Be, Part 1: How to Securely Send and Monitor Your Audit Logs with InsightIDR

Products and Tools

Be Audit You Can Be, Part 1: How to Securely Send and Monitor Your Audit Logs with InsightIDR

Teresa Copple's avatar

Teresa Copple

Import External Threat Intelligence with the InsightIDR Threats API

Detection and Response

Import External Threat Intelligence with the InsightIDR Threats API

Teresa Copple's avatar

Teresa Copple

Automating the Cloud: AWS Security Done Efficiently

Detection and Response

Automating the Cloud: AWS Security Done Efficiently

Josh Frantz's avatar

Josh Frantz