ChaosSearch Blog SecOps Posts

8 MIN READ

3 Use Cases for Relational Access to Log Data

By George Hamilton on Jan 1, 2022

ChaosSearch has experienced tremendous growth as evidenced by being named one of...

TOPIC

14 MIN READ

Log Analytics 2021 Guide

By Dave Armlin on Sep 2, 2021

As enteprise networks grow larger and more complex, IT teams are increasingly dependent on the...

14 MIN READ

Log Analytics and SIEM for Enterprise Security Operations and Threat Hunting

By Dave Armlin on Jul 22, 2021

Today’s enterprise networks are heterogeneous, have multiple entry points, integrate with...

5 MIN READ

Why Midsized SecOps Teams Should Consider Security Log Analytics Instead of Security and Information Event Management

If Ben Franklin lived today, he would add cyber threats to his shortlist of life’s certainties.

3 MIN READ

Cyber Defense Magazine Names ChaosSearch “Cutting Edge” in Cybersecurity Analytics

By Thomas Hazel on May 17, 2021

Exciting news — ChaosSearch won the 2021 InfoSec “Cutting Edge in Cybersecurity Analytics” award...

9 MIN READ

Threat Hunting Frameworks and Methodologies: An Introductory Guide

By Thomas Hazel on Apr 29, 2021

Creating an effective threat hunting program is among the top priorities of security leaders...

13 MIN READ

How To Use the MITRE ATT&CK Framework

By Thomas Hazel on Mar 18, 2021

MITRE ATT&CK® is an invaluable resource for IT security teams, who can leverage the framework to...

Subscribe to Our Blog