Operations | Monitoring | ITSM | DevOps | Cloud

Threat Hunting

Threat Hunting with Network Metadata

Maintaining a safe and secure network is not optional with an ever increasing amount of threats and methods of intrusion. Learn how you can leverage network metadata for fast and effective threat hunting, today. In this webinar, you will see how bringing together NetOps and SecOps information can help your organization continually locate and validate past and present indicators of compromise more efficiently

Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 2)

In Part 2 of this two-part series, our goal is to provide security practitioners with better visibility, knowledge, and capabilities relative to malicious persistence techniques that impact organizations around the world every day. In this post, we’ll explore two additional persistence techniques that are being used by attackers in the wild: Scheduled Tasks (T1053) and BITS Jobs (T1197).

Next-Level Threat Hunting: Shift Your SIEM from Reactive to Proactive

Threat hunting is proactively identifying and thwarting unusual network activity that could indicate an attempted security breach. It's a historically manual activity, making it time-intensive and arduous. It’s no wonder, then, why most organizations don’t have the time, budget, or resources to undertake it effectively…if at all.