Seth GoldhammerThe Curse of the Medium-Priority AlertWhat comes back to bite us when we stop looking?4 min read·Dec 15, 2020----
Seth GoldhammerWhy Log Analysis is Still Our Primary Security Investigation ToolIt started with a moderately prioritized SIEM alert triggered by the firewall allowing external traffic right after the Intrusion…4 min read·Dec 1, 2020----
Seth GoldhammerWhy Security Analytics Should Start With the End in MindWhile many organizations collect data to ‘see what they get’, successful implementations take an analytics first approach5 min read·Nov 10, 2020----
Seth GoldhammerFour Steps for Faster Security Alert TriageDiscover how to use your existing controls to consolidate alerts and tune severity scores to respond to the highest probability of active…4 min read·Sep 22, 2020----
Seth GoldhammerCybersecurity is Like Playing Dungeons & DragonsHow our security operations mirror the fantasy tabletop role-playing game4 min read·Sep 8, 2020----
Seth GoldhammerWhy Security Analysts Don’t Trust AlertsThink about what it means to be a security analyst. Do you have a picture in mind? The variety is amazing. Some work in mature security…4 min read·Aug 26, 2020----
Seth GoldhammerThree Impediments to Cybersecurity OperationsWhy is Ground Truth so critical for cybersecurity operations?3 min read·Aug 11, 2020----