Security Monitoring and attack detection planning guide

Today, I had some time to read the "The security Monitoring and Attack Detection Planning Guide" by Microsoft. I have read different documents in the last couple of months aimed at security monitoring in the Microsoft endpoint however this document it is completely up to date and can help organizations to understand the requirements they … Continue reading Security Monitoring and attack detection planning guide

Cyber Threat Hunting (2): Getting Ready

In my previous post I went through the basics of hunting and its benefits for the organization and for analysts. To continue the journey, today I am going to cover the preparations you need to do before you go out there and hunt. We are covering preparations and locations to hunt. As you need some … Continue reading Cyber Threat Hunting (2): Getting Ready