Blog archive
2020
2019
2018
- Resilient Workflows and Playbooks
folder_open - Implementation – STIX knowledge and relevance graph – steps 16-21
folder_open - Implementation – Related IP Addresses – steps 11-15
folder_open - Implementation – STIX bundle – steps 7-10
folder_open - Implementation – Overview – steps 0-6
folder_open - Solution Draft
folder_open - Current Security Operations and DFIR problems
folder_open - Operationalizing the MITRE ATT&CK framework for Security Operations, Threat Hunting and DFIR
folder_open
Sign up for FREE online training sessions Intelligence-driven Threat Hunting for improving SOC maturity level
with SOAR, MITRE ATT&CK, SANS 6-step IR, The Diamond Model of Intrusion Analysis, Cyber Threat Intelligence, MaGMa Use Case Framework and more
Abstract:
In order to increase their maturity level, SOC organizations frequently introduce intelligence-driven Threat Hunting. Benefits of intel-driven Threat Hunting are... Read more
Rukhsar's recent GCFA Gold paper
December 2019
Read Rukhsar's recent GCFA Gold paper with the title Threat Hunting and Incident Response in a post-compromised environment
