All Posts
Avatar

Jack Naglieri

23 articles

Going Closed Source

AWS Security Logging Fundamentals — S3 Bucket Access Logging

Security Monitoring with CrowdStrike Falcon Events

Automated Detection and Response with Panther and Tines

Threat Hunting at Scale

From StreamAlert to Panther

Panther Labs Series A Funding

Osquery Log Analysis Guide

AWS EC2 Security Log Monitoring: The Cloud-Native Way