Detection at Scale
Subscribe
Sign in
Home
Notes
Spotify
Archive
About
Latest
Top
Discussions
An Introduction to Cyber Threat Intelligence (CTI)
Effectively using IoCs and TTPs in SIEM for the highest-quality alerts and response context.
Apr 22
•
Jack Naglieri
Share this post
An Introduction to Cyber Threat Intelligence (CTI)
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
The Sisense Breach Quick Hits
What happened, who's affected, and how to remediate.
Apr 16
•
Jack Naglieri
Share this post
The Sisense Breach Quick Hits
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
5 SIEM Capabilities for Detection Engineering
Tips for evaluating Detection as Code, Data Pipelines, APIs, and more...
Apr 15
•
Jack Naglieri
2
Share this post
5 SIEM Capabilities for Detection Engineering
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
Improving Security Data Lake Efficiency with Log Filtering
The problem with unfiltered data, the power of log filtering, practical techniques, and benefits.
Apr 8
•
Jack Naglieri
6
Share this post
Improving Security Data Lake Efficiency with Log Filtering
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
The xz-utils Backdoor Quick Hits
With tips on how to detect the vulnerable version running in production.
Apr 2
•
Jack Naglieri
2
Share this post
The xz-utils Backdoor Quick Hits
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
Unraveling SIEM Correlation Techniques
This post will explain correlation rules, elaborate on the techniques, and equip you to utilize their potential for building high-quality signals.
Apr 1
•
Jack Naglieri
6
Share this post
Unraveling SIEM Correlation Techniques
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
February 2024
Leading Panther's Next Chapter as CTO
To our customers, investors, partners, and team, Today, I’m pleased to announce a transition in my role at Panther from CEO to CTO to lead our technical…
Feb 5
•
Jack Naglieri
3
Share this post
Leading Panther's Next Chapter as CTO
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
October 2023
The Transition from Monolithic SIEMs to Data Lakes for Security Monitoring
The nuance of data backends to support detection at scale.
Oct 23, 2023
•
Jack Naglieri
7
Share this post
The Transition from Monolithic SIEMs to Data Lakes for Security Monitoring
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
December 2022
Zero False Positives from your SIEM
Is it possible?
Dec 5, 2022
•
Jack Naglieri
3
Share this post
Zero False Positives from your SIEM
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
September 2022
Five Lessons From Detection & Response Leaders
via the Detection at Scale podcast
Sep 26, 2022
•
Jack Naglieri
Share this post
Five Lessons From Detection & Response Leaders
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
July 2022
Think Like a Detection Engineer, Pt. 2: Rule Writing
Writing effective, tested, and actionable rules!
Jul 25, 2022
•
Jack Naglieri
2
Share this post
Think Like a Detection Engineer, Pt. 2: Rule Writing
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
2
Think Like a Detection Engineer, Pt. 1: Logging
Instrumenting our security data
Jul 18, 2022
•
Jack Naglieri
10
Share this post
Think Like a Detection Engineer, Pt. 1: Logging
jacknaglieri.substack.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts