LogicHub6 Critical Components of Effective eXtended Detection and Response (XDR)There’s a lot of confusion about the exact definition of an XDR solution, which can obfuscate the important details around what it can…Sep 13, 2021Sep 13, 2021
LogicHubThe need for consolidated detection and responseIf you pay attention to emerging trends in cybersecurity, you’ve probably seen the explosion of companies marketing XDR, the latest acronym…Sep 1, 2021Sep 1, 2021
LogicHubXDR? SOAR? Is there a difference?Every few years comes a new wave of technology solution marketing that is centered around a common acronym, introducing the latest approach…Jul 28, 2021Jul 28, 2021
LogicHubWhy it’s time to for a new approach to SIEMWhy do you need to rethink how you collect, store and analyze your log data? It’s not because SIEM has stopped being valuable, or in the…Jul 15, 2021Jul 15, 2021
LogicHubReducing Alert Fatigue with AutomationWhile the numbers vary from study to study based on research methodology, organizational profile and differences in survey questions, there…Jul 9, 2021Jul 9, 2021
LogicHubPrintNightmare Breakdown: Analysis and RemediationExploit Background At the start of this month, a proof of concept for a Microsoft print spooler vulnerability rocked Windows admins…Jul 9, 2021Jul 9, 2021
LogicHubHow to implement MITRE ATT&CK based detection and response in under 30 daysThe MITRE ATT&CK framework has become increasingly prevalent as a best practices approach to detection and response over the last few…Jun 24, 2021Jun 24, 2021
LogicHubWhy you should consider phishing triage as a serviceAt this point you’d be hard pressed to find someone who hasn’t heard of phishing. But despite increased awareness and a wide range of…Jun 10, 2021Jun 10, 2021
LogicHubPart 2: How to Respond to AttackIn our last entry, we discussed the purpose of and past responses to banking ransomware. In this section, we’ll follow a timeline of the…May 10, 2021May 10, 2021
LogicHubDissecting Ransomware: How Hostage Data Leaks Secrets and Causes Devastation: Part 1At this point, almost everyone has been exposed to the problem of ransomware. Even if not directly impacted you’ve probably heard about it…Apr 26, 2021Apr 26, 2021