Introduction into Eland - DataFrames and Machine Learning backed by Elasticsearch

Introduction into Eland, a Python package to analyse, explore and manipulate Elasticsearch data. In this talk, Seth Larson introduces us to Eland. Eland is a Python Elasticsearch client for exploring and analyzing data residing in Elasticsearch with a familiar Pandas-compatible API.

Intelligence Driven Threat Hunting with SOAR

Most security teams face the same challenges when it comes to their ability to be proactive: skills shortages, lack of visibility into weaknesses and the incapacity of internal resources to detect and eliminate threats. Cyberint’s new solution uncovers existing compromises, malicious activity, persistence, and residuals from past breaches with an intelligence-driven approach to hunt down threats. When managed threat hunting is combined with the power of security orchestration, automation and response (SOAR), organizations can obtain critical context about attacks in real-time, streamlining the response process. How managed threat hunting helps businesses be proactive about their security. Why it’s critical to onboard managed threat hunting service at a time when global challenges like COVID-19 create business disruption and change organizations’ digital environments for months or years to come The types of threats that can be discovered during a threat hunt – from active attacks to the remnants of past intrusions. How leveraging SOAR technology can help automate hunts and better manage security incidents, from identification to remediation, through custom playbooks. Presented By Adi Perez - VP Technology, CyberInt Nimmy Reichenberg - Cheif Marketing Officer, Siemplify

Creating a Scalable and Repeatable Threat Hunting Program with Carbon Black and Siemplify

According to SANS, 82% of all SOCs are investing in advanced Threat Hunting programs, but that is no simple task. Many organizations struggle with incorporating threat hunting into their security operations efforts due to a lack of expertise. Creating an effective threat hunting program requires a combination of the right tools and the right processes. The combination of flexibility and automation opens up the ability for anyone in the security operations center to perform threat hunting at scale.

Kublr, enterprise-grade Kubernetes -- an overview (short demo)

Centrally deploy, run, and manage Kubernetes clusters across all of your environments with a comprehensive container orchestration platform that finally delivers on the Kubernetes promise. Optimized for large enterprises, Kublr is designed to provide multi-cluster deployments and observability. We made it easy, so your team can focus on what really matters: innovation and value generation.

A Dose Of Data Science Demystification

Join two data engineers and analysts in pulling back the curtain on real customer engagements, showing how to select and implement advanced data science and analytic techniques. In this session we will discuss our implementation of two data science models at a large agricultural products manufacturer: a propensity-to-buy model and a recommendation engine. We will discuss how each of these models works and how they were implemented for our client.

What is Rancher?

This video provides a short introduction to Rancher, the world’s most widely deployed Kubernetes management platform. With Rancher, IT organizations can deploy, manage and secure any Kubernetes deployment regardless of where it is running. Best of all, Rancher is intuitive to use, and built to support DevOps teams, as they use containers to automate operations and move to continuous delivery. Rancher is 100% free and open source.

Logging Best Practices in the CI/CD Era

With the overabundance of log data available today, it’s easy to simply limit logging events. However, this pattern overlooks the latent value in your log data. To be proactive, rather than reactive. Utilizing their experience serving 1,500+ customers worldwide, Ariel Assaraf, CEO of Coralogix, will show you how to transform your logs into a treasure trove of opportunities for improving your CICD process and anticipating operational problems before they happen.
squared up

Azure Monitor Agents: their different functions

In the Azure Monitor Learning Path, we talked about metrics and collecting data in a Log Analytics workspace to be operated on with KQL. As a part of it, we also talked about Monitoring Solutions and how they help you collect data into the workspace that is more focused for specific purposes. In that series, our main focus was on the Log Analytics Agent and I briefly talked about Diagnostics extension.

icinga

Icinga 2, Icinga Web 2 and Director Kickstart on CentOS 7

The easiest way to get started with Icinga is a single-node installation. If you are new to the Icinga world, here you have a kickstart for installing Icinga 2, Icinga Web 2 and Icinga Director on CentOS 7. With these steps you will have a ready Icinga environment for monitoring your infrastructure.

netskope

Lnkr Makes a Comeback - This Ad's For Us

Previously Netskope Threat Labs published a blog post about a Lnkr ad injector campaign launched using Google Chrome extensions. As Figure 1 illustrates, the number of Lnkr infections spiked dramatically in November 2019 and again in the spring of 2020, when Brian Krebs uncovered information about the source of the infected Chrome extensions. .

onpage

NHS on Its Final Leg of Pager Replacement

If you’ve been following the U.K. healthcare landscape, you would know that the country has been considering replacing pagers for the longest time. This may soon materialize, partly accelerated by the challenges that doctors are facing during the COVID-19 pandemic. The pager replacement initiative not only signifies a pivotal shift from the aging infrastructure, but it also indicates how pagers have failed to thrive in today’s unprecedented times.

workativ

Step-by-step guide: How to set up a Zendesk chatbot with Workativ Assistant

According to the Zendesk Benchmark, it takes an average of 24.2 hours to provide the first response to an internal support ticket. And internal support teams receive around 492 tickets per month. This means that help desk agents in internal support teams have to spend approximately a whopping 11906.4 hours to solve tickets per month which leads to attrition. Moreover, the cost of manually handling a help desk ticket is $22.