Comparing Detection Results with Microsoft365 Defender
Our objective: Comparing detection results from our EAGLE system with Microsoft365 Defender. And since the environments we typically work in are hybrid IT environments, consisting of both cloud and on-premise infrastructure, we wanted to make sure to include on-premise Windows machines in our testing process.
Vulnerability management in critical infrastructure
Vulnerability management in critical infrastructure - practical experience from the tank storage industry. To manage risks, you need to know your attack surface in the IT and OT infrastructure. Vulnerability management in critical infrastructure is therefore essential.
Tired of Slow, Manual Logstash Syntax Checking?
In order to accelerate the process of writing log parsers in Logstash, we set out to develop our own Logstash syntax checking tool. This blog article outlines how the syntax checker works and explains how this does not interfere with Logstash’s real-time pipelining capability.
Reducing the attack surface through vulnerability management
If we have to assume that the human vulnerability will be exploited sooner or later, the underlying IT infrastructure must be hardened accordingly and the attack surface consistently reduced.