Endpoint Security Part 3: How to correlate threat intelligence

Endpoint Security Part 3: Threat Intelligence

Overview In this third article of a 5 part series on ‘Endpoint Security’ I’m going to be showing you how you can incorporate ‘Threat Intelligence’ into your security operations strategy. There has been a lot written about threat intelligence over the last decade and it has different meanings to people depending on what industry you…

Read More

Endpoint Security Part 2: Enriching your security event data

Data enrichment with Elastic

In this second part series on ‘Endpoint Security’ I’m going to delve into how you can enrich your security event data to provide further context to assist your security analysts when investigating incidents. In this example we will lead off where we ended from ‘Endpoint Security Part 1’  and so if you were following the…

Read More