Planning Your Log Collection

LEARNING OBJECTIVES Organize your logging strategy Define “scope” Understand how to prioritize your logging strategy Understand ..

2 years ago
0
254

Threat Hunting with Cloud SIEM

Threat hunting is emerging as a must-have addition to cybersecurity strategies. By enabling organizations to find and mitigate threats before ..

2 years ago
0
824

What Is Threat Intelligence?

It’s one thing to detect a cyber attack. It’s another to know what the attackers are trying to do, which tactics they are using, ..

2 years ago
0
852

Logging for Microservices

LEARNING OBJECTIVES Introduction to microservices Learn about logging as a tool Discover why centralized logging is essential for managing ..

2 years ago
0
291

Microservices vs. Serverless Architecture

Microservices and serverless are both important topics in the world of cloud-native computing. Yet, although serverless functions and microservices ..

2 years ago
0
571