All Posts

Attacking SIEM with Fake Logs

Discussion around ATT&CK often involves tactics, techniques, procedures, detections, and mitigations, but a significant element is often overlooked: data sources. Data sources for every technique provide valuable context and opportunities to improve your security posture and impact your detection strategy.

RIS, the Robot Immune System

Safety requires security in robotics

As robots start populating our lives, safety and security are topics gaining more and more traction. Safety cares about the robot not harming the environment (or humans) whereas security deals with the opposite, aims to ensure the environment does not conflict with the robot’s programmed behavior. There’s an intrinsic connection between safety and security.

splunk-d2e-business-analytics-codesign2019

Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range

Discussion around ATT&CK often involves tactics, techniques, procedures, detections, and mitigations, but a significant element is often overlooked: data sources. Data sources for every technique provide valuable context and opportunities to improve your security posture and impact your detection strategy.

Top