Intelligence & Analytics January 11, 2018 Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques 8 min read - Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.
Intelligence & Analytics January 17, 2017 Applying Machine Learning to Improve Your Intrusion Detection System 6 min read - Security analysts can train intelligent intrusion detection systems to distinguish between normal and malicious traffic by creating generic data sets.
Intelligence & Analytics December 2, 2016 Detect Endpoint Threats by Analyzing Process Logs in QRadar 4 min read - Using an SIEM solution such as QRadar, security professionals can analyze process logs to detect, hunt and trace the source of threats.
Intelligence & Analytics November 4, 2016 How to Add User-Defined AQL Functions in QRadar 3 min read - IT professionals can leverage user-defined AQL functions in QRadar to perform complex calculations and analyze data retrieved from the Ariel databases.