Truls TDinDetect FYIDeconstructing Security Monitoring AntipatternsWelcome back to another post — this time we are talking about antipatterns. If you don’t know what an antipattern is, we can describe it…Aug 19Aug 19
Truls TDinDetect FYISecurity Monitoring — Developing Use CasesIn this blog post I'll be writing about developing use cases for security monitoring. I'll be using Microsoft Sentinel as an example…May 9May 9
Truls TDinDetect FYIAutomating Security Monitoring — Part 2: AutomationLet's get straight to the point; security monitoring is the process of consuming data, analyzing it and detecting malicious activity, then…Mar 1Mar 1
Truls TDinDetect FYIAutomating Security Monitoring — Part 1: DataLately I've been presenting a few times on the topic of automation and in particular for security monitoring to combat alert fatigue…Mar 1Mar 1