Mastering Detection Engineering with AI: Practical Use Cases
SOC Prime
Mastering Detection Engineering with AI: Practical Use Cases
49:27
Bear Fence for MDE - Quick Start Guide
SOC Prime
Bear Fence for MDE - Quick Start Guide
4:02
SOC Prime Ecosystem: Maximize Security Stack Value with AI & Automation
SOC Prime
SOC Prime Ecosystem: Maximize Security Stack Value with AI & Automation
50:23
Next-Gen SOC: Innovationen & Best Practices für Unternehmenssicherheit
SOC Prime
Next-Gen SOC: Innovationen & Best Practices für Unternehmenssicherheit
35:37
Context-Based Detection Engineering: Who Is Attacking You, and How Can You Defend?
SOC Prime
Context-Based Detection Engineering: Who Is Attacking You, and How Can You Defend?
46:54
Contribute Roota and Sigma Rules to Threat Bounty via Uncoder AI
SOC Prime
Contribute Roota and Sigma Rules to Threat Bounty via Uncoder AI
6:44
Proactive Threat Detection & Automated Threat Hunting in the Era of Security Data Lakes: Part 2
SOC Prime
Proactive Threat Detection & Automated Threat Hunting in the Era of Security Data Lakes: Part 2
46:44
Proactive Threat Detection & Automated Threat Hunting in the Era of Security Data Lakes: Part 1
SOC Prime
Proactive Threat Detection & Automated Threat Hunting in the Era of Security Data Lakes: Part 1
43:29
SOC Prime Webinar: Unlock Your Detection Engineering Excellence
SOC Prime
SOC Prime Webinar: Unlock Your Detection Engineering Excellence
33:34
Scaling Up Cyber Defense: Best Practices by SOC Prime and LogRhythm
SOC Prime
Scaling Up Cyber Defense: Best Practices by SOC Prime and LogRhythm
39:06
SOC Prime Threat Bounty Program: Interview with Program Member - Phyo Paing Htun
SOC Prime
SOC Prime Threat Bounty Program: Interview with Program Member - Phyo Paing Htun
5:30
SOC Prime Webinar: Estrategias Proactivas para la Excelencia en Ciberseguridad
SOC Prime
SOC Prime Webinar: Estrategias Proactivas para la Excelencia en Ciberseguridad
58:07
SOCtober Scares: Cybersecurity Horror Night
SOC Prime
SOCtober Scares: Cybersecurity Horror Night
51:32
Truth behind Sigma Rules you have to know and facts that Florian Roth has twisted
SOC Prime
Truth behind Sigma Rules you have to know and facts that Florian Roth has twisted
26:27
SOC Prime Webinar: Ideas for Detections, from Hypothesis to Hunt
SOC Prime
SOC Prime Webinar: Ideas for Detections, from Hypothesis to Hunt
45:35
Uncoder AI: package IOCs to 44 SIEM, EDR & Data Lake queries
SOC Prime
Uncoder AI: package IOCs to 44 SIEM, EDR & Data Lake queries
0:41
Uncoder AI: Viewing rule details
SOC Prime
Uncoder AI: Viewing rule details
1:54
Write a Sigma rule in 120 seconds
SOC Prime
Write a Sigma rule in 120 seconds
2:01
Uncoder AI  Selecting a Sigma rule
SOC Prime
Uncoder AI Selecting a Sigma rule
0:35
The Prime Hunt browser extension
SOC Prime
The Prime Hunt browser extension
2:24
Maximizing SOC Efficiency in 2023: Useful Tricks Using SOC Prime Platform
SOC Prime
Maximizing SOC Efficiency in 2023: Useful Tricks Using SOC Prime Platform
46:08
Sandworm ru APT Power Outage cyberattack MITRE ATT&CK, Sigma rules & IOC matching based on CERT-UA
SOC Prime
Sandworm ru APT Power Outage cyberattack MITRE ATT&CK, Sigma rules & IOC matching based on CERT-UA
11:02
Satisnet & SOC Prime webinar demo 2 Microsoft Security: Armed and Ready for Cyber Warfare
SOC Prime
Satisnet & SOC Prime webinar demo 2 Microsoft Security: Armed and Ready for Cyber Warfare
1:26
Satisnet & SOC Prime webinar demo 1 Microsoft Security: Armed and Ready for Cyber Warfare
SOC Prime
Satisnet & SOC Prime webinar demo 1 Microsoft Security: Armed and Ready for Cyber Warfare
2:50
Hunt for Log4Shell with Azure Sentinel, the fastest way, find obfuscations
SOC Prime
Hunt for Log4Shell with Azure Sentinel, the fastest way, find obfuscations
0:48
Fastest way to hunt for Log4shell CVE-2021-44228 log4j vulnerability exploitation and attacks
SOC Prime
Fastest way to hunt for Log4shell CVE-2021-44228 log4j vulnerability exploitation and attacks
5:16
Log4Shell obfuscation detection with SIEM and detection pads method by Florian Roth
SOC Prime
Log4Shell obfuscation detection with SIEM and detection pads method by Florian Roth
0:37
Log4j CVE202144228 IOC Matching with GreyNoise and Uncoder CTI SOC Prime
SOC Prime
Log4j CVE202144228 IOC Matching with GreyNoise and Uncoder CTI SOC Prime
0:58
Log4j CVE202144228 Quick Hunt SOC Prime Sigma
SOC Prime
Log4j CVE202144228 Quick Hunt SOC Prime Sigma
1:44
Stumbling Blocks in Detection Engineering: Moving Them to Go Onward & Beyond
SOC Prime
Stumbling Blocks in Detection Engineering: Moving Them to Go Onward & Beyond
1:00:11
Search Bar at Threat Detection Marketplace
SOC Prime
Search Bar at Threat Detection Marketplace
4:21
Security Talks with SOC Prime: All about SIGMA
SOC Prime
Security Talks with SOC Prime: All about SIGMA
1:25:03
Start Page at Threat Detection Marketplace
SOC Prime
Start Page at Threat Detection Marketplace
1:37
SOCPrime Session - HANDLE ZOOM BOMBINGS, MALWARE SPREADING, COVID19 PHISHING.
SOC Prime
SOCPrime Session - HANDLE ZOOM BOMBINGS, MALWARE SPREADING, COVID19 PHISHING.
44:30
Security Talks with SOC Prime: Seamless Threat Detection w/ Corelight & Threat Detection Marketplace
SOC Prime
Security Talks with SOC Prime: Seamless Threat Detection w/ Corelight & Threat Detection Marketplace
47:57
Security Talks with SOC Prime: Too Much Information Security
SOC Prime
Security Talks with SOC Prime: Too Much Information Security
1:03:01
Security Talks with SOC Prime: Adventures in Mapping things to MITRE ATT&CK
SOC Prime
Security Talks with SOC Prime: Adventures in Mapping things to MITRE ATT&CK
1:08:53
Live presentation of Continuous Content Management
SOC Prime
Live presentation of Continuous Content Management
41:07
Security Talks with SOC Prime: Ideas for detections, from hypothesis to hunt
SOC Prime
Security Talks with SOC Prime: Ideas for detections, from hypothesis to hunt
45:35
Humio & SOC Prime Workshop: Identify Cybersecurity Threats in Real Time
SOC Prime
Humio & SOC Prime Workshop: Identify Cybersecurity Threats in Real Time
56:50
SOC Prime Webinar: Streamline Your Proactive Threat Hunting
SOC Prime
SOC Prime Webinar: Streamline Your Proactive Threat Hunting
55:50
SOC Prime Webinar: Data Sources
SOC Prime
SOC Prime Webinar: Data Sources
56:52
Weekly Talks on breaking news in cyber security (as of June 2020).
SOC Prime
Weekly Talks on breaking news in cyber security (as of June 2020).
46:46
Custom Field Mapping at Threat Detection Marketplace (TDM)
SOC Prime
Custom Field Mapping at Threat Detection Marketplace (TDM)
8:21
Content types at Threat Detection Marketplace (TDM)
SOC Prime
Content types at Threat Detection Marketplace (TDM)
3:25
API at Threat Detection Marketplace (TDM)
SOC Prime
API at Threat Detection Marketplace (TDM)
3:13
Wanted page at Threat Detection Marketplace (TDM)
SOC Prime
Wanted page at Threat Detection Marketplace (TDM)
2:38
MITRE ATT&CK® page at Threat Detection Marketplace (TDM)
SOC Prime
MITRE ATT&CK® page at Threat Detection Marketplace (TDM)
5:42
SIEM integrations: Elastic, Splunk and Azure Sentinel with Threat Detection Marketplace (TDM)
SOC Prime
SIEM integrations: Elastic, Splunk and Azure Sentinel with Threat Detection Marketplace (TDM)
5:38
Rule Master at Threat Detection Marketplace (TDM)
SOC Prime
Rule Master at Threat Detection Marketplace (TDM)
4:17
Filters at Threat Detection Marketplace (TDM)
SOC Prime
Filters at Threat Detection Marketplace (TDM)
6:25
Search: Standard and Lucene at Threat Detection Marketplace (TDM)
SOC Prime
Search: Standard and Lucene at Threat Detection Marketplace (TDM)
2:38
Azure Sentinel - Accelerated SIEM Transformation with Sigma
SOC Prime
Azure Sentinel - Accelerated SIEM Transformation with Sigma
1:01:23
SOC Prime CVE-2019-0708 ArcSight Rulepack overview
SOC Prime
SOC Prime CVE-2019-0708 ArcSight Rulepack overview
3:46
Sigma from scratch and MITRE attack
SOC Prime
Sigma from scratch and MITRE attack
11:51
Sigma Translate: One common language for cyber security
SOC Prime
Sigma Translate: One common language for cyber security
2:49
Use Case Cloud 2.5 overview
SOC Prime
Use Case Cloud 2.5 overview
5:43
SMA Cloud overview
SOC Prime
SMA Cloud overview
6:29