Anomaly Detection with SureLog SIEM UEBA Module Using Markov Chain
Anomaly detection in sequence data is becoming more and more important to detect
SURELOG TAXONOMY
A taxonomy improves the scope and stability of correlation rules. It also aids
Threat Detection and Hunting with MITRE ATT&CK Techniques Using SureLog SIEM
Spearphishing Link (T1192) Spearphishing with a link is a specific variant of spearphishing. It
SureLog Intelligent Response
SureLog Intelligent Response
Detecting Attacks with SureLog SIEM
Detecting Attacks with SureLog SIEM
Detecting Unusual Activities Using SureLog Next Generation SIEM –Use Cases Part 2
This article is part of a series. Check out the full series Part1 [1]. The efficiency and effectiveness of security
Detecting Unusual Activities Using SureLog Next Generation SIEM: Use Cases
Next-Gen SIEMs have brought new capabilities to organizations and their security teams. They’re built from the ground
SureLog Correlation Rule Development Example Video
https://www.youtube.com/watch?v=1jbWtewE-FM&t=35s
Never Seen Before Type of Rules With SureLog SIEM
Event correlation techniques are designed to detect events, make sense of them and
Not All SIEM Solutions Are Equal and Not All SIEM Use Cases Are the Same
Security Information and Event Management (SIEM) solutions are an important tool in a