May 24, 2015DefensiveDepthLeave a Comment on Sysmon & Security Onion, Part 4: Integrating Security Onion and Sysmon Sysmon & Security Onion, Part 4: Integrating Security Onion and Sysmon
April 20, 2015May 24, 2015DefensiveDepthLeave a Comment on Sysmon & Security Onion, Part 3: Enterprise Security Monitoring Sysmon & Security Onion, Part 3: Enterprise Security Monitoring
April 6, 2015May 24, 2015DefensiveDepthLeave a Comment on Sysmon & Security Onion, Part 2: Rise of Intelligence-Driven Computer Network Defense Sysmon & Security Onion, Part 2: Rise of Intelligence-Driven Computer Network Defense
April 1, 2015DefensiveDepth1 Comment on Sysmon & Security Onion: Monitoring Key Windows Processes for Anomalies Sysmon & Security Onion: Monitoring Key Windows Processes for Anomalies
March 29, 2015DefensiveDepthLeave a Comment on Sysmon & Security Onion, Part 1: Rise of the Encrypted Web Sysmon & Security Onion, Part 1: Rise of the Encrypted Web
March 27, 2015March 29, 2015DefensiveDepthLeave a Comment on Using Sysmon To Enrich Security Onion’s Host-Level Capabilities Using Sysmon To Enrich Security Onion’s Host-Level Capabilities
September 8, 2013DefensiveDepth1 Comment on Security Onion Cloud Client – NSM for the Cloud Security Onion Cloud Client – NSM for the Cloud
April 21, 2009January 4, 2016DefensiveDepthLeave a Comment on YouTube Vid of Bejtlich @ a BSD Conference… YouTube Vid of Bejtlich @ a BSD Conference…
August 5, 2008January 4, 2016DefensiveDepthLeave a Comment on Book Review of “Tao of Network Security Monitoring” Book Review of “Tao of Network Security Monitoring”