threat detection
Focus Threat Intel Capabilities at Detection Engineering (Part 4)
This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#4 in the series), we will start to talk about the ...
Buyers Guide for AI Threat Detection and Response
In this buyers guide you'll learn about the many approaches to AI Threat detection and Response, what to look for, benefits, drawbacks, and everything you need to know when choosing an AI ...
Why Smart SOAR is the Best SOAR for Darktrace
The need for integrated cybersecurity solutions has never been more pressing. With the growing complexity of cyber threats, having siloed security tools is no longer an option. This is where the synergy ...
IBM Unfurls AI-Powered Managed Threat Detection and Response
IBM today added managed threat detection and response services that leverage artificial intelligence (AI) to identify and thwart cyberattacks ...
Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks
Nutanix extended an ability to detect threats that can be addressed by kicking off a recovery process that takes less than 20 minutes to execute ...
Build for Detection Engineering, and Alerting Will Improve (Part 3)
This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#3 in the series), we will start to define and refine ...
Detection Engineering and SOC Scalability Challenges (Part 2)
This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.This post is our second installment in the “Threats into Detections — The DNA of Detection ...
Automated Incident Response with AWS and Smart SOAR
D3 Smart SOAR offers 12 out-of-the-box integrations with Amazon Web Services (AWS) products. These include: AWS CloudTrail AWS CloudWatch AWS EC2 AWS ECS AWS EKS AWS S3 AWS SQS AWS SSM AWS ...
Threat-informed or Threat-owned? Classic Practices Will Probably Save You!
So, if you are too busy to read our amazing (duh!) new blog “Revisiting Traditional Security Advice for Modern Threats”, here are the key ideas from it.At some point, a “pre-owned” (compromised before ...
XDR vs. SIEM vs. SOAR: A Vendor-Agnostic Perspective
For modern SOC teams, detection and response is a big data problem. Effective cyber defense hinges on collecting, analyzing, and acting on massive troves of security-relevant data. This is where tools like ...