Many attacks are described using free text. This happens, then this, then this. Whereas detection rules provide a structured way to represent these descriptions with actionable content. Attack Flows are the perfect vehicle to combine the two approaches.| dogesec
Learn how to seamlessly convert Sigma Rules into queries for your SIEM. Follow along with real examples.| dogesec
Correlation Rules allow you to detect threats by linking multiple events together based on a meaningful relationship.| dogesec
Learn how to turn threat intelligence into actionable detection rules. Learn how to build behavioral detection using STIX Patterns, and link sightings to evidence.| dogesec
Despite countless frameworks, best practices, blog posts… so many developers still hardcode credentials into their code.| dogesec