TechTalk

Endpoint Detection and Response solutions provide more comprehensive defenses than conventional antivirus software and can detect fileless attacks launched through legitimate Windows programs.
The SECUINFRA Falcon Team analyzed a recent attack conducted by the south-Asian Advanced Persistent Threat group „Bitter“.
The key to early detection of complex threats is to recognize signs of attack from as many parts of the attack chain as possible.
A Co-Managed SIEM approach is suitable for companies that do not want to outsource all SIEM services, but only selected ones.
What is important when developing use cases? Our SIEM Experts team answers the 5 most frequently asked questions on this topic.  
SIEM use case developers assume a central position in the cyber defense team. But what exactly does SIEM use case development entail? We asked one of our cyber defense consultants in more detail.
With the plethora of daily threats, an organization's cybersecurity teams need to be able to respond immediately and efficiently to existing threat situations.
Monitoring the network infrastructure is an important addition to existing monitoring measures. It complements the information provided by a SIEM system.
What can you do now to uncover existing compromises of your network in a timely manner and thus avert massive financial damage and reputational risks from your company? With a Compromise Assessment (CA), an effective investigation method is available that makes hidden attack activities in your network visible.
In the course of SIEM implementations, one of the biggest challenges for companies is to answer the question of which attack scenarios should be detected by the SIEM system and how these attack scenarios should be prioritized.
Cookie Consent with Real Cookie Banner