Tag: Rezaadineh
-
Using the MITRE ATT&CK Matrix for Effective Threat Hunting
Introduction Effective threat hunting is a proactive approach to cybersecurity that involves identifying and mitigating potential threats before they can cause harm to an organization’s systems and data. One advanced method of threat hunting is the use of the MITRE ATT&CK Matrix. The MITRE ATT&CK Matrix is a knowledge base of known adversary tactics, techniques,…
-
A quick guide on how to estimate Log Retention and log rotation policies
Step 1: Define Retention and Rotation Policies Step 2: Determine Event Size Step 3: Determine EPS (Events Per Second) Step 4: Determine Daily Disk Space Requirements Step 5: Compress Logs Step 6: Determine Storage Requirement for the Estimated Total Average EPS Here’s an example calculation based on the above policies: Note: These calculations are just…
-
A quick guideline for how to estimate or calculate your EPS or required capacity
To estimate the capacity required for log management, you need to determine the EPS and then calculate the amount of disk space needed to store the logs generated at that rate. Here’s a step-by-step guide: Step 1: Determine the EPS To determine the EPS, you need to know the number of events generated per second.…
-
A quick review on Anatomy of cyber attacks for beginners
Introduction As the world becomes increasingly interconnected through the internet, the threat of cyber attacks has grown exponentially. A cyber attack is a deliberate attempt to exploit vulnerabilities in computer systems, networks, or devices for malicious purposes. In this white paper, we will discuss the anatomy of a cyber attack, the different types of cyber…
-
Using Threat-Informed Detection Approaches for Implementing Prevention and Detection Solutions in a SOC and Mapping to the NIST CSF
Introduction: In today’s complex threat landscape, organizations must take a proactive approach to cybersecurity. Threat-informed detection and prevention approaches involve using threat intelligence to identify and respond to potential cybersecurity threats. Within a Security Operations Center (SOC), threat-informed approaches can be integrated into the incident response process to more effectively detect, respond to, and recover…
-
A useful concepts for SIEM assessment, implementing a SIEM-CMM: SIEM capability Maturity Model concepts
I. Introduction A. Purpose of the white paper The purpose of this white paper is to provide an overview of the Technical Capability and Maturity Model (CMM) for Security Information and Event Management (SIEM) implementation, and to highlight the importance of SIEM implementation capability and maturity for organizations. B. Definition of SIEM SIEM is a…
-
A quick review on SOAR platforms
Introduction: In recent years, security operations teams have been inundated with a deluge of security alerts and incidents that are difficult to manage and resolve efficiently. As a result, organizations are increasingly turning to Security Orchestration, Automation and Response (SOAR) platforms to help them streamline their security operations and improve their response times. In this…
-
A quick review on SIEM Implementation Technical Capability and Maturity Model
Introduction Security Information and Event Management (SIEM) solutions are essential components of modern cybersecurity architectures. These solutions enable organizations to collect, correlate, and analyze security-related data from various sources, including logs, network traffic, and endpoint devices. By providing real-time threat detection and incident response capabilities, SIEM solutions help organizations protect their assets and data from…
-
A quick review on using AI for malware generation
The use of Artificial Intelligence (AI) in malware generation has been a topic of much discussion in the cybersecurity industry. While AI has the potential to revolutionize the way malware is created, it also has the potential to create even more sophisticated and devastating cyber attacks. One of the main benefits of using AI in…
-
SIEM Solutions: A Guide to Proper Capacity Management
Abstract: The security information and event management (SIEM) solution is a critical component for any organization’s security posture. It enables the organization to collect, analyze, and correlate data from various sources to detect and respond to security incidents. However, choosing the right SIEM solution can be a daunting task, especially when it comes to capacity…