
EP125 Will SIEM Ever Die: SIEM Lessons from the Past for the Future
Cloud Security Podcast by Google
How to Use Sim to Detect Known Threats
If we wanted to do rules that detect specific known threats, I'd leave it to the vendors that do that better. To the EDR vendors at the end point, to an NTA vendor, to an IDS vendor. If I'm going to write a lot of very specific signature detection rules, I's going to do it somewhere else. So I use sim to look for patterns, repeat attacks, success after failed, anomalous events. A spiking quantity, an activity that nobody else like them does. Those are different. They can be different. But they also can be the same in many minds.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.