Posts tagged Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 2)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 2)

Eric Sun's avatar

Eric Sun

Prepare for Battle: Let’s Build an Incident Response Plan (Part 1)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 1)

Eric Sun's avatar

Eric Sun

Firewall Reporting Excessive SYN Packets? Check Rate of Connections

Detection and Response

Firewall Reporting Excessive SYN Packets? Check Rate of Connections

Rapid7's avatar

Rapid7

Changing the Corporate Network Attacker’s Risk-Reward Paradigm

Detection and Response

Changing the Corporate Network Attacker’s Risk-Reward Paradigm

Justin Houk's avatar

Justin Houk

SIEM Market Evolution And The Future of SIEM Tools

Detection and Response

SIEM Market Evolution And The Future of SIEM Tools

Matt Hathaway's avatar

Matt Hathaway

How to Detect BitTorrent Traffic on your Network

Detection and Response

How to Detect BitTorrent Traffic on your Network

Rapid7's avatar

Rapid7

The Legal Perspective of a Data Breach

Detection and Response

The Legal Perspective of a Data Breach

Rapid7's avatar

Rapid7

Web Shells 101: Detection and Prevention

Detection and Response

Web Shells 101: Detection and Prevention

Oliver Keyes's avatar

Oliver Keyes

How to Troubleshoot Slow Network Issues With Network Traffic Analysis

Detection and Response

How to Troubleshoot Slow Network Issues With Network Traffic Analysis

Rapid7's avatar

Rapid7

Introspective Intelligence: Understanding Detection Techniques

Detection and Response

Introspective Intelligence: Understanding Detection Techniques

Mike Scutt's avatar

Mike Scutt

Displace SIEM "Rules" Built for Machines with Custom Alerts Built For Humans

Detection and Response

Displace SIEM "Rules" Built for Machines with Custom Alerts Built For Humans

Matt Hathaway's avatar

Matt Hathaway

Warning: This Blog Post Contains Multiple Hoorays! #sorrynotsorry

Detection and Response

Warning: This Blog Post Contains Multiple Hoorays! #sorrynotsorry

Sam Humphries's avatar

Sam Humphries

5 Methods For Detecting Ransomware Activity

Detection and Response

5 Methods For Detecting Ransomware Activity

Darragh Delaney's avatar

Darragh Delaney

You Need To Understand Lateral Movement To Detect More Attacks

Detection and Response

You Need To Understand Lateral Movement To Detect More Attacks

Matt Hathaway's avatar

Matt Hathaway

What Makes SIEMs So Challenging?

Detection and Response

What Makes SIEMs So Challenging?

Spencer Engleson's avatar

Spencer Engleson

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Detection and Response

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Christian Kirsch's avatar

Christian Kirsch

Calling Your Bluff: Behavior Analytics in Poker and Incident Detection

Detection and Response

Calling Your Bluff: Behavior Analytics in Poker and Incident Detection

Eric Sun's avatar

Eric Sun

What is Incident Detection and Response?

Detection and Response

What is Incident Detection and Response?

Katherine A. Hayes's avatar

Katherine A. Hayes

Top 5 Alternatives For SPAN or Mirror Ports

Detection and Response

Top 5 Alternatives For SPAN or Mirror Ports

Darragh Delaney's avatar

Darragh Delaney

Let's talk about metrics...

Detection and Response

Let's talk about metrics...

Wim Remes's avatar

Wim Remes

Tracking Web Activity by MAC Address

Detection and Response

Tracking Web Activity by MAC Address

Darragh Delaney's avatar

Darragh Delaney