All Posts


22 articles

Method to the Madness: Developing a Detection Engineering Methodology

Zero False Positives from your SIEM

Threat Hunting in AWS

5 Things You Need to Know About the State of SIEM in 2022

State of SIEM 2022: 5 Key Takeaways

How Booz Allen Hamilton uses Detection-as-Code to Transform Security in the Federal Government

Going Phishless: How Panther Deployed WebAuthN with Okta & YubiKeys

Five Lessons From Detection & Response Leaders

Think Like a Detection Engineer, Pt. 2: Rule Writing