home.social

#securityoperations — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #securityoperations, aggregated by home.social.

  1. NCSC Warns of Flawed SOC Metrics

    The National Cyber Security Centre is warning that common security operations center metrics are fundamentally flawed, and that the only metric that truly matters is whether attacks are detected and responded to in a timely manner. By focusing on easily quantifiable but misleading metrics, organizations may inadvertently be encouraging their teams to prioritize…

    osintsights.com/ncsc-warns-of-

    #SocMetrics #SecurityOperations #Secops #NationalCyberSecurityCentre #Ncsc

  2. What is DCSync Attack and Mimikatz Usage in Active Directory

    One of the most critical attacks in Active Directory environments, DCSync, allows attackers to impersonate a Domain Controller and extract password hashes through replication abuse.

    #CyberSecurity #ActiveDirectory #DCSync #RedTeam #BlueTeam #InfoSec #Pentesting #SOC #ThreatDetection #WindowsSecurity #EthicalHacking #ITSecurity #NetworkSecurity #SecurityOperations #DenizHalil

    denizhalil.com/2026/03/27/dcsy

  3. What is DCSync Attack and Mimikatz Usage in Active Directory

    One of the most critical attacks in Active Directory environments, DCSync, allows attackers to impersonate a Domain Controller and extract password hashes through replication abuse.

    #CyberSecurity #ActiveDirectory #DCSync #RedTeam #BlueTeam #InfoSec #Pentesting #SOC #ThreatDetection #WindowsSecurity #EthicalHacking #ITSecurity #NetworkSecurity #SecurityOperations #DenizHalil

    denizhalil.com/2026/03/27/dcsy

  4. Third-party breach, 38M impacted, European e-commerce sector.
    ManoMano disclosed unauthorized access linked to a subcontracted customer support provider. Exposed data reportedly includes PII and support communications.
    Authorities notified: CNIL, ANSSI.
    Passwords not reportedly accessed.
    Subcontractor access revoked.

    Key risk vectors:
    – SaaS support platforms
    – Vendor access governance
    – Over-retention of ticketing data
    – Centralized customer communication logs
    – Supply chain attack surface expansion

    This case reinforces that vendor monitoring must go beyond contractual clauses — continuous assessment, least privilege enforcement, data minimization strategies.

    How mature is your third-party risk telemetry?
    Engage below.

    Source: bleepingcomputer.com/news/secu

    Follow @technadu for high-signal infosec reporting.

    Repost to amplify awareness across the security community.

    #Infosec #ThirdPartyRisk #VendorSecurity #SupplyChainSecurity #DataBreach #GDPRCompliance #EcommerceSecurity #CyberRiskManagement #SecurityOperations #GRC

  5. Sector alert: European football club targeted.

    Olympique de Marseille confirmed an attempted cyberattack following alleged data leak claims involving:
    • ~400,000 supporter records
    • 2,050+ Drupal CMS accounts
    • E-commerce and membership-related data
    No confirmed compromise of banking credentials, investigation ongoing, incident reported to CNIL.
    Attack surface observations:
    – CMS exposure risk
    – High-value fan PII aggregation
    – Merchandising platforms as entry vectors
    – Sector-wide vulnerability patterns (preceded by FFF breach)
    Sports organizations increasingly mirror enterprise-scale digital infrastructures - yet often lack comparable security maturity.

    What baseline controls should leagues enforce - MFA mandates, zero trust architecture, CMS hardening standards?

    Source: bleepingcomputer.com/news/secu

    Engage in the comments.
    Follow TechNadu for high-signal infosec coverage.

    Repost to amplify sector awareness.

    #Infosec #DrupalSecurity #DataBreach #SportsSecurity #ThreatIntelligence #CyberRisk #GDPRCompliance #SecurityOperations #DigitalForensics #CyberDefense

  6. Incident Overview:
    • Accidental disclosure via incorrect link sharing
    • Recipient knowingly accessed confidential police documents
    • Refusal to delete without compensation
    • Arrest under suspected computer trespass provisions

    Security Takeaways:
    – Operational errors remain a primary breach vector
    – Access control workflows must differentiate upload vs. download permissions
    – User awareness and response protocols are critical
    – Legal frameworks increasingly address post-error exploitation

    This case illustrates a subtle but important principle: accidental exposure does not equate to authorized access.

    From a governance and control perspective, what technical safeguards would you implement to prevent similar incidents?

    Engage below.
    Follow @technadu for cybersecurity intelligence and policy analysis.

    #Infosec #DataGovernance #AccessControl #CyberLaw #SecurityOperations #IncidentResponse #RiskManagement #PrivacyCompliance #TechNadu

  7. Incident Overview:
    • Accidental disclosure via incorrect link sharing
    • Recipient knowingly accessed confidential police documents
    • Refusal to delete without compensation
    • Arrest under suspected computer trespass provisions

    Security Takeaways:
    – Operational errors remain a primary breach vector
    – Access control workflows must differentiate upload vs. download permissions
    – User awareness and response protocols are critical
    – Legal frameworks increasingly address post-error exploitation

    This case illustrates a subtle but important principle: accidental exposure does not equate to authorized access.

    From a governance and control perspective, what technical safeguards would you implement to prevent similar incidents?

    Engage below.
    Follow @technadu for cybersecurity intelligence and policy analysis.

    #Infosec #DataGovernance #AccessControl #CyberLaw #SecurityOperations #IncidentResponse #RiskManagement #PrivacyCompliance #TechNadu

  8. Incident Overview:
    • Accidental disclosure via incorrect link sharing
    • Recipient knowingly accessed confidential police documents
    • Refusal to delete without compensation
    • Arrest under suspected computer trespass provisions

    Security Takeaways:
    – Operational errors remain a primary breach vector
    – Access control workflows must differentiate upload vs. download permissions
    – User awareness and response protocols are critical
    – Legal frameworks increasingly address post-error exploitation

    This case illustrates a subtle but important principle: accidental exposure does not equate to authorized access.

    From a governance and control perspective, what technical safeguards would you implement to prevent similar incidents?

    Engage below.
    Follow @technadu for cybersecurity intelligence and policy analysis.

    #Infosec #DataGovernance #AccessControl #CyberLaw #SecurityOperations #IncidentResponse #RiskManagement #PrivacyCompliance #TechNadu

  9. Incident Overview:
    • Accidental disclosure via incorrect link sharing
    • Recipient knowingly accessed confidential police documents
    • Refusal to delete without compensation
    • Arrest under suspected computer trespass provisions

    Security Takeaways:
    – Operational errors remain a primary breach vector
    – Access control workflows must differentiate upload vs. download permissions
    – User awareness and response protocols are critical
    – Legal frameworks increasingly address post-error exploitation

    This case illustrates a subtle but important principle: accidental exposure does not equate to authorized access.

    From a governance and control perspective, what technical safeguards would you implement to prevent similar incidents?

    Engage below.
    Follow @technadu for cybersecurity intelligence and policy analysis.

    #Infosec #DataGovernance #AccessControl #CyberLaw #SecurityOperations #IncidentResponse #RiskManagement #PrivacyCompliance #TechNadu

  10. 🚨 Legitimate RMM Abuse in Crazy Ransomware Intrusions

    Huntress investigations reveal:
    • Net Monitor for Employees deployed via msiexec
    • SimpleHelp persistence via PowerShell
    • Disguised binaries (OneDriveSvc.exe, vhost.exe)
    • Defender service tampering
    • Crypto wallet keyword monitoring
    • SSL VPN credential compromise as initial access

    The adversary leveraged redundancy across remote access tools to guarantee persistence even if one method was removed.

    Key takeaway: Detection must focus on anomalous deployment patterns of legitimate administrative tools - not just malware signatures.

    Are you correlating RMM installations with VPN authentication anomalies?

    Engage with your defensive insights below.
    Follow @technadu for advanced threat intelligence coverage.

    Source: bleepingcomputer.com/news/secu

    #InfoSec #ThreatHunting #Ransomware #MFA #RMM #CyberDefense #SecurityOperations #BlueTeam #ThreatIntel

  11. 🚨 Legitimate RMM Abuse in Crazy Ransomware Intrusions

    Huntress investigations reveal:
    • Net Monitor for Employees deployed via msiexec
    • SimpleHelp persistence via PowerShell
    • Disguised binaries (OneDriveSvc.exe, vhost.exe)
    • Defender service tampering
    • Crypto wallet keyword monitoring
    • SSL VPN credential compromise as initial access

    The adversary leveraged redundancy across remote access tools to guarantee persistence even if one method was removed.

    Key takeaway: Detection must focus on anomalous deployment patterns of legitimate administrative tools - not just malware signatures.

    Are you correlating RMM installations with VPN authentication anomalies?

    Engage with your defensive insights below.
    Follow @technadu for advanced threat intelligence coverage.

    Source: bleepingcomputer.com/news/secu

    #InfoSec #ThreatHunting #Ransomware #MFA #RMM #CyberDefense #SecurityOperations #BlueTeam #ThreatIntel

  12. 🚨 Legitimate RMM Abuse in Crazy Ransomware Intrusions

    Huntress investigations reveal:
    • Net Monitor for Employees deployed via msiexec
    • SimpleHelp persistence via PowerShell
    • Disguised binaries (OneDriveSvc.exe, vhost.exe)
    • Defender service tampering
    • Crypto wallet keyword monitoring
    • SSL VPN credential compromise as initial access

    The adversary leveraged redundancy across remote access tools to guarantee persistence even if one method was removed.

    Key takeaway: Detection must focus on anomalous deployment patterns of legitimate administrative tools - not just malware signatures.

    Are you correlating RMM installations with VPN authentication anomalies?

    Engage with your defensive insights below.
    Follow @technadu for advanced threat intelligence coverage.

    Source: bleepingcomputer.com/news/secu

    #InfoSec #ThreatHunting #Ransomware #MFA #RMM #CyberDefense #SecurityOperations #BlueTeam #ThreatIntel

  13. 🚨 Legitimate RMM Abuse in Crazy Ransomware Intrusions

    Huntress investigations reveal:
    • Net Monitor for Employees deployed via msiexec
    • SimpleHelp persistence via PowerShell
    • Disguised binaries (OneDriveSvc.exe, vhost.exe)
    • Defender service tampering
    • Crypto wallet keyword monitoring
    • SSL VPN credential compromise as initial access

    The adversary leveraged redundancy across remote access tools to guarantee persistence even if one method was removed.

    Key takeaway: Detection must focus on anomalous deployment patterns of legitimate administrative tools - not just malware signatures.

    Are you correlating RMM installations with VPN authentication anomalies?

    Engage with your defensive insights below.
    Follow @technadu for advanced threat intelligence coverage.

    Source: bleepingcomputer.com/news/secu

    #InfoSec #ThreatHunting #Ransomware #MFA #RMM #CyberDefense #SecurityOperations #BlueTeam #ThreatIntel

  14. 🚨 JokerOTP PhaaS Seller Arrested - Netherlands

    A coordinated law enforcement operation has resulted in the arrest of a suspected JokerOTP access seller. The platform enabled automated OTP interception via synchronized login attempts and vishing bots.

    Impact:
    • $10M in financial damage
    • 28,000+ attacks
    • 13 countries affected
    • High-value targets: PayPal, Coinbase, Amazon, Apple

    This incident underscores the operational reality: MFA bypass increasingly exploits the human layer rather than technical vulnerabilities.

    Are phishing-resistant authentication methods becoming mandatory rather than optional?
    Engage below with your defensive strategy insights.

    Source: bleepingcomputer.com/news/secu

    Follow @technadu for ongoing threat intelligence and global cybercrime updates.

    #InfoSec #ThreatIntelligence #PhishingDefense #MFABypass #CyberCrime #SecurityOperations #FraudPrevention #TechNadu

  15. Atlassian audit logs aren’t useless. They’re shaped wrong.

    Nested JSON and shifting arrays turn simple questions into manual work. Dashboards break. The fix isn’t more parsing in the SIEM. It’s modeling audit data at the edge.
    graylog.org/post/from-atlassia
    #SecurityOperations #SIEM #AuditLogs

  16. Security planners supporting the Milano Cortina Winter Games say drones are now treated as a baseline threat category for major international events - alongside cyber incidents, protests, and opportunistic crime.

    Officials highlighted the importance of coordination, terrain awareness at outdoor venues, and clear enforcement of no-drone zones, noting that most incidents historically involve unauthorized filming rather than malicious intent.

    From a security operations perspective, where should priority be placed as event complexity increases?

    Source: reuters.com/world/us-security-

    Join the discussion and follow @technadu for grounded reporting on security and technology.

    #EventSecurity #CounterUAS #CyberRisk #SecurityOperations #InfoSec #TechNadu

  17. The British Army’s £279M investment in a permanent cyber regiment base signals how cyber defence is being treated as critical operational infrastructure.

    With tens of thousands of attempted intrusions reported in recent years, the focus is shifting toward secure facilities, specialist training environments, and long-term capability building - rather than ad-hoc cyber responses.

    From an InfoSec standpoint, this raises important questions around resilience, talent development, and sustained defensive readiness.

    Follow @technadu for neutral analysis on cyber defence, threat landscapes, and security strategy.

    Professional discussion welcome.

    #CyberDefense #MilitaryCyber #InfoSec #CyberResilience #SecurityOperations #CyberInfrastructure #ThreatLandscape #DefenseTech

  18. The British Army’s £279M investment in a permanent cyber regiment base signals how cyber defence is being treated as critical operational infrastructure.

    With tens of thousands of attempted intrusions reported in recent years, the focus is shifting toward secure facilities, specialist training environments, and long-term capability building - rather than ad-hoc cyber responses.

    From an InfoSec standpoint, this raises important questions around resilience, talent development, and sustained defensive readiness.

    Follow @technadu for neutral analysis on cyber defence, threat landscapes, and security strategy.

    Professional discussion welcome.

    #CyberDefense #MilitaryCyber #InfoSec #CyberResilience #SecurityOperations #CyberInfrastructure #ThreatLandscape #DefenseTech

  19. The British Army’s £279M investment in a permanent cyber regiment base signals how cyber defence is being treated as critical operational infrastructure.

    With tens of thousands of attempted intrusions reported in recent years, the focus is shifting toward secure facilities, specialist training environments, and long-term capability building - rather than ad-hoc cyber responses.

    From an InfoSec standpoint, this raises important questions around resilience, talent development, and sustained defensive readiness.

    Follow @technadu for neutral analysis on cyber defence, threat landscapes, and security strategy.

    Professional discussion welcome.

    #CyberDefense #MilitaryCyber #InfoSec #CyberResilience #SecurityOperations #CyberInfrastructure #ThreatLandscape #DefenseTech

  20. The British Army’s £279M investment in a permanent cyber regiment base signals how cyber defence is being treated as critical operational infrastructure.

    With tens of thousands of attempted intrusions reported in recent years, the focus is shifting toward secure facilities, specialist training environments, and long-term capability building - rather than ad-hoc cyber responses.

    From an InfoSec standpoint, this raises important questions around resilience, talent development, and sustained defensive readiness.

    Follow @technadu for neutral analysis on cyber defence, threat landscapes, and security strategy.

    Professional discussion welcome.

    #CyberDefense #MilitaryCyber #InfoSec #CyberResilience #SecurityOperations #CyberInfrastructure #ThreatLandscape #DefenseTech

  21. ESA is assessing claims of a data exposure involving hundreds of gigabytes of internal and contractor-linked information, following a prior incident disclosed weeks earlier.

    Alleged data types include operational procedures, satellite system documentation, and third-party materials - highlighting challenges around:
    Long-term identity and access management
    Vendor and contractor trust boundaries
    Monitoring across complex, distributed environments

    This case reinforces the importance of continuous risk assessment and defense-in-depth, especially for organizations supporting critical infrastructure and research missions.

    What defensive control would you prioritize in environments like this?

    Source: theregister.com/2026/01/07/eur

    Engage in the discussion and follow TechNadu for objective InfoSec reporting.

    #InfoSec #CyberDefense #ThirdPartyRisk #CriticalInfrastructure #SecurityOperations #TechNadu

  22. Detailed article discusses competing policy directions for (1) USA to be a leader in drone technology vs (2) the need to prevent drones from being used to inflict major harm in the USA. No paywall.

    Pic is an image from the article. As if we did not already have enough to worry about. 😟
    #Drone #CounterDrone #Defense #SecurityOperations

  23. AI in a SOC shouldn’t be “push button, solve security.” It’s better as a force multiplier: faster triage, cleaner investigations, safer automation, and way less copy/paste misery.

    I also get into the guardrails that actually matter (evidence-first summaries, human-in-the-loop, prompt injection, least privilege).

    Read it here: kylereddoch.me/blog/putting-ai

    #cybersecurity #SOC #SecurityOperations #AI #IncidentResponse #SIEM #SOAR

  24. AI in a SOC shouldn’t be “push button, solve security.” It’s better as a force multiplier: faster triage, cleaner investigations, safer automation, and way less copy/paste misery.

    I also get into the guardrails that actually matter (evidence-first summaries, human-in-the-loop, prompt injection, least privilege).

    Read it here: kylereddoch.me/blog/putting-ai

    #cybersecurity #SOC #SecurityOperations #AI #IncidentResponse #SIEM #SOAR

  25. Check out ˗ˏˋ ⭒ lnkd.in/gE2wUqgc ⭒ ˎˊ˗ to see my intro whilst you listen.

    I'm thus re-naming this work as "CVE Keeper - Security at x+1; rethinking vulnerability management beyond CVSS & scanners". I must also thank @andrewpollock for reviewing several of my verbose drafts. 🫡

    So, Security at x+1; rethinking vulnerability management beyond CVSS & scanners -

    Most vulnerability tooling today is optimized for disclosure and alert volume, not for making correct decisions on real systems. CVEs arrive faster than teams can evaluate them, scores are generic, context arrives late, and we still struggle to answer the only question that matters: does this actually put my system at risk right now?

    Over the last few years working close to CVE lifecycle automation, I’ve been designing an open architecture that treats vulnerability management as a continuous, system-specific reasoning problem rather than a static scoring task. The goal is to assess impact on the same day for 0-days using minimal upstream data, refine accuracy over time as context improves, reason across dependencies and compound vulnerabilities, and couple automation with explicit human verification instead of replacing it.

    This work explores:

    ⤇ 1• Same-day triage of newly disclosed and 0-day vulnerabilities
    ⤇ 2• Dependency-aware and compound vulnerability impact assessment
    ⤇ 3• Correlating classical CVSS with AI-specific threat vectors
    ⤇ 4• Reducing operational noise, unnecessary reboots, and security burnout
    ⤇ 5• Making high-quality vulnerability intelligence accessible beyond enterprise teams

    The core belief is simple: most security failures come from misjudged impact, not missed vulnerabilities. Accuracy, context, and accountability matter more than volume.

    I’m sharing this to invite feedback from folks working in CVE, OSV, vulnerability disclosure, AI security, infra, and systems research. Disagreement and critique are welcome. This problem affects everyone, and I don’t think incremental tooling alone will solve it.

    P.S.

    • Super appreciate everyone that's spent time reviewing my drafts and reading all my essays lol. I owe you 🫶🏻
    • ... and GoogleLM. These slides would have taken me forever to make otherwise.

    Take my CVE-data User Survey to allow me to tailor your needs into my design - lnkd.in/gcyvnZeE
    See more at - lnkd.in/gGWQfBW5
    lnkd.in/gE2wUqgc

    #VulnerabilityManagement #Risk #ThreatModeling #CVE #CyberSecurity #Infosec #VulnerabilityManagement #ThreatIntelligence #ApplicationSecurity #SecurityOperations #ZeroDay #RiskManagement #DevSecOps #CVE #CVEAnalysis #VulnerabilityDisclosure #SecurityData #CVSS #VulnerabilityAssessment #PatchManagement #AI #AIML #AISecurity #MachineLearning #AIThreats #AIinSecurity #SecureAI #OSS #Rust #ZeroTrust #Security

    linkedin.com/feed/update/urn:l

  26. Trend Micro’s 2026 predictions highlight the shift toward industrialized cybercrime driven by AI automation, autonomous intrusion workflows, and synthetic attack chains. Hybrid cloud, supply chains, and AI ecosystems are expected to face increasing pressure.

    How can defenders balance automation with human validation in the coming years?

    Source: cxotoday.com/press-release/tre

    Follow us for more fact-driven analysis.

    #infosec #cybersecurity #AI #automation #cloudsecurity #supplychainsecurity #threatintel #securityoperations #ransomware #technadu

  27. New blog post live for my Sentinel Saturday series! :1000: :apartyblobcat:
    Read the blog 👉 marshsecurity.org/sentinel-sat

    In this post, I explore the power of using Microsoft Sentinel Tasks as part of your automation workflows.

    Most teams aren’t getting the full #value out of Tasks in Microsoft Sentinel. Are you? When you combine Sentinel Tasks with automation, they become a game-changer.

    - Auto-create tasks when automation fails (so nothing slips through the cracks)
    - Auto-complete tasks when automation succeeds
    - Use tasks to verify automation outcomes
    - Build engineering feedback loops and automation #QA

    Read the blog 👉 marshsecurity.org/sentinel-sat

    #MicrosoftSentinel #SentinelAutomation #CyberSecurity #SOCAutomation
    #CloudSecurity #AzureSecurity #SIEM #SecOps #Automation #InfoSec
    #CyberSecurityCommunity #BlueTeam #ThreatDetection #SecurityEngineering #SecurityOperations

  28. We❤️ Bob!

    You know Bob—stuck in the #SOC, drowning in data he can't actually use, trying to do his job with tools that seem designed to slow him down rather than help him solve problems.
    I've always felt for Bob.
    His passion is real, but the system?
    Not so much.

    Now I have hope for Bob, thanks to Crogl, Inc.

    monzy merza, CEO at Crogl, Inc., joins Sean Martin, CISSP and me for a conversation that's part philosophy, part rebellion, and part actual product demo—showing how a SOC can work when data never has to move and analysts finally get their time back.

    We dig into what happens when you stop forcing everything into the same shape and start letting analysts actually investigate.

    AI's role in collaboration. Building trust across the SOC. And Monzy drops this gem: "You don't eat food from a chef who's never eaten food. Why build a company without truly understanding the problem?" 🍳 👨‍🍳 🔪

    This is exactly why Studio C60 / ITSPmagazine exists—to tell stories that matter, challenge assumptions, and maybe give Bob a fighting chance.

    Here's to many more conversations like this one with Crogl, Inc.'s Team!

    Stop normalizing everything. Start solving something.

    📺 Watch the video and demo: youtube.com/watch?v=7C4zOvF9sdk

    📖 Read the article: itspmagazine.com/their-stories

    🎧 Listen to the audio: brand-stories-podcast.simpleca

    🌐 Learn more about Crogl: itspm.ag/crogl-103909

    🔖 More Crogl stories: itspmagazine.com/directory/cro

    #cybersecurity #ai #soc #securityoperations #technology #innovation #brandstory #podcast #welovebob #infosec #agenticAI #genAI #infoseurity

  29. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  30. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  31. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  32. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  33. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  34. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  35. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  36. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  37. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  38. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  39. 🕵️‍♂️ KQL is both a science and an art.

    If you’ve ever felt your Sentinel queries were running slow or costing more than they should, you’re not alone.
    This week’s #SentinelSaturdays covers how to write leaner, faster, more efficient KQL queries with practical examples you can use today.

    🔗 Read the full walkthrough here: marshsecurity.org/sentinel-ski

    Share your comments 👇
    What’s YOUR top KQL tip or favourite optimisation trick?

    Let’s build a thread of practical advice for the hunting community.
    #MicrosoftSentinel #KQL #ThreatHunting #SecurityOperations

  40. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  41. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  42. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  43. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  44. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  45. Drum roll please! 🥁🥁🥁 Today we are excited to introduce the new Logs & Lattes podcast. 💥🎙️ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. ⛔ 💵 🤔

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 😓

    But, there’s a smarter way forward. 😍 Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! 📺 👇

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  46. Drum roll please! 🥁🥁🥁 Today we are excited to introduce the new Logs & Lattes podcast. 💥🎙️ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. ⛔ 💵 🤔

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 😓

    But, there’s a smarter way forward. 😍 Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! 📺 👇

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  47. Drum roll please! 🥁🥁🥁 Today we are excited to introduce the new Logs & Lattes podcast. 💥🎙️ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. ⛔ 💵 🤔

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 😓

    But, there’s a smarter way forward. 😍 Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! 📺 👇

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes