Blog
-
Enterprise SIEMs Detect Fewer Than 5 of Top 14 MITRE ATT&CK Adversary Techniques Used in the Wild
“Organizations need to become more intentional about detection in their SOCs. What should we detect? Do we have use cases for those scenarios? Do they actually work? Do they help my SOC analysts effectively triage
-
Dr. Anton Chuvakin answers questions about SIEM, EDR, and XDR — from our recent SANS webinar on the future of SIEM
Dr. Anton Chuvakin Discusses “20 Years of SIEM – What’s Next?” Learn what Dr. Anton Chuvakin, Head of Security Solution Strategy at Google Cloud and former Gartner Research VP, has to say about questions like:
-
Spring into action (with SIEM detection rules for Spring4shell)
Spring into action (with SIEM detection rules for Spring4shell) The Spring Framework is an open source application framework that provides infrastructure support for developing Java applications. The framework can be used by any Java application
-
Lapsus$ vs the world: SIEM detection rules with ATT&CK mapping
Image credit: World of Dictionary A new player has entered the game The ”Lapsus$” group, unknown before December 2021, has made multiple headlines in recent weeks, following multiple data breaches in big companies such as
-
How do Russian threat groups avoid “friendly cyber fire”? (TL;DR – By installing a Russian language pack)
Welcome to cyber-physical conflict The current situation in Ukraine demonstrates once again how the lines have blurred between cyber and physical conflict.
-
What Anton Chuvakin is Saying About SOC Threat Coverage
Anton Chuvakin, SIEM expert and former Gartner analyst (now at Google Chronicle) has written a thought-provoking blog post titled “SOC Threat Coverage Analysis — Why/How?“.
-
Why Detection for Log4j Vulnerabilities is Both Important and Difficult
In the last few weeks we’ve heard a lot about the Log4j vulnerabilities, with the most prominent being log4shell, and unfortunately, this is just the beginning. The situation is very serious, as the recommendations from
-
Broken Glam: How healthy is your SIEM?
Threats are constant. Organizations are trying to always stay ahead of new methods of attack, APT groups, and other known vulnerabilities. A key component of any SOC is a well-functioning SIEM. However, the SIEM is
-
The Problem You Didn’t Know You Had – The Threat Coverage Gap
At CardinalOps, we talk to many, many security professionals about their security engineering practices, and their Security Information and Event Management (SIEM) solutions. The typical challenges we hear are:
-
Cloud Security Engineering – Automation to the Rescue!
Enterprises of all types and sizes are shifting to the cloud. Cloud related services, IaaS, PaaS, and SaaS are presenting new digital IT business opportunities with both short term and long term benefits. In fact,
-
SC Magazine Covers CardinalOps Threat Coverage Gap: SIEM Rules Ignore Bulk of MITRE ATT&CK
SC Magazine Coverage of CardinalOps: SIEM Rules Ignore Bulk of MITRE ATT&CK
-
The Comforting (or Discomforting?) Feeling of Objective Data Validation
It’s always nice to have conviction in your assumptions and hypotheses, but in the world we currently occupy there is a huge premium on truth, data and facts. I am, therefore, happy to announce the