Sign in

There’s a lot of confusion about the exact definition of an XDR solution, which can obfuscate the important details around what it can specifically do for your security posture. For those looking for value in an XDR solution, there are six critical capabilities that should be considered a must.

1…


If you pay attention to emerging trends in cybersecurity, you’ve probably seen the explosion of companies marketing XDR, the latest acronym buzzword on the market, which stands for eXtended Detection and Response. …


Every few years comes a new wave of technology solution marketing that is centered around a common acronym, introducing the latest approach to solving a specific problem, and cyber security technology is no different. …


Why do you need to rethink how you collect, store and analyze your log data? It’s not because SIEM has stopped being valuable, or in the case of compliance, necessary. It’s because most of the traditional approaches to platform-based SIEM deployments are still running on 20 year old technology at…


While the numbers vary from study to study based on research methodology, organizational profile and differences in survey questions, there is nearly universal agreement that alert fatigue is a significant issue for most security teams. And the high volume of alerts consists largely of false positives. In fact, some security…


Exploit Background
At the start of this month, a proof of concept for a Microsoft print spooler vulnerability rocked Windows admins, causing a clamor to contain the worst of the damage. This vulnerability is covered under CVE-2021–34527.

Originally beginning as a marked ‘low severity’ vulnerability, a proof of concept showed…


The MITRE ATT&CK framework has become increasingly prevalent as a best practices approach to detection and response over the last few years, and for good reason. Rather than promoting an artificial methodology that advances a specific vendor-driven agenda, it aims to create and document a list of known attacker tactics…


At this point you’d be hard pressed to find someone who hasn’t heard of phishing. But despite increased awareness and a wide range of solutions specifically designed to detect and prevent phishing attacks, it’s still one of the biggest threats to any organization. To put it into perspective:

  • 75% of…

In our last entry, we discussed the purpose of and past responses to banking ransomware. In this section, we’ll follow a timeline of the stages of infection through a common ransomware strain and the proper response at each stage. …


At this point, almost everyone has been exposed to the problem of ransomware. Even if not directly impacted you’ve probably heard about it in the news, as an increasing number of banks, hospitals, local governments and other organizations fall victim to costly attacks. …

LogicHub

The SOAR and MDR company Automation-driven Detection and Response

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store