So, Chronicle, Are You a SIEM?

With this post, I am about to answer the question everybody wants to know the answer for …
… is Chronicle a SIEM?
However, if you are impatient and need to get the answer right now, here it is: Chronicle can address many modern se… Continue reading So, Chronicle, Are You a SIEM?

Road to Detection: YARA-L Examples — Part 4 of 3

Road to Detection: YARA-L Examples — Part 4 of 3
Upon reading all of Part 1, Part 2 and Part 3 of my blog series that revealed our (Chronicle) approach to detection, many of you asked for more YARA-L detection language examples.
Continue reading Road to Detection: YARA-L Examples — Part 4 of 3

Detection Coverage and Detection-in-Depth

For some time, I’ve been also fascinated with the concept of detection-in- depth and a somewhat related concept of optimal detection coverage.
This fascination was born out of a particular type of analyst inquiry I used to get: if I have SIEM, do… Continue reading Detection Coverage and Detection-in-Depth

How to Fail at “Know Your Enemy”?!

As a security professional, you’ve heard the slogan “Know Your Enemy” more than a few times in your career. Armchair security strategists love to mindlessly quote Sun Tzu such as by uttering things like “If you know the enemy an… Continue reading How to Fail at “Know Your Enemy”?!

Security Correlation Then and Now: A Sad Truth About SIEM

We all know David Bianco Pyramid of Pain, a classic from 2013. The focus of this famous visual is on indicators that you “latch onto” in your detection activities. This post will reveal a related mystery connected to SIEM detection evolutio… Continue reading Security Correlation Then and Now: A Sad Truth About SIEM