
Sign up to save your podcasts
Or


Vaughn will discuss using freely available tools and logs you are already collecting to detect attacker behavior. Vaughn has a cookbook that will allow you to configure and analyze logs to detect attacks in your environment. You don't need anything fancy to detect attacks, use what you have along with freely available tools and techniques!
To get involved with LogRhythm, go to: https://www.securityweekly.com/logrhythm
Full Show Notes: https://wiki.securityweekly.com/Episode587
Follow us on Twitter: https://www.twitter.com/securityweekly
By Paul Asadoorian5
22 ratings
Vaughn will discuss using freely available tools and logs you are already collecting to detect attacker behavior. Vaughn has a cookbook that will allow you to configure and analyze logs to detect attacks in your environment. You don't need anything fancy to detect attacks, use what you have along with freely available tools and techniques!
To get involved with LogRhythm, go to: https://www.securityweekly.com/logrhythm
Full Show Notes: https://wiki.securityweekly.com/Episode587
Follow us on Twitter: https://www.twitter.com/securityweekly

2,011 Listeners

363 Listeners

148 Listeners

83 Listeners

79 Listeners

651 Listeners

5 Listeners

8,077 Listeners

51 Listeners

315 Listeners
![Talkin' Bout [Infosec] News by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
94 Listeners

139 Listeners

168 Listeners