‼️We are introducing a tool for the first time…

🔨Hefaistos - AI assisted Detection-as-Code platform

📅 We are starting on January 31, 2025

Details and waiting list here - https://blog.dcg420.org/from-static-template-to-dynamic-forge-bringing-the-dcg420-standard-to-life-for-the-detectioniers-db4298e6bf22

#Detection #Detectionengineering #Detectionascode #DaC #Hefaistos

Intelligence-Driven Detection Engineering: From Threat Intel to Detection-as-Code (with the Pyramid…

In cybersecurity, one of the most important questions organizations ask is often the wrong one. It’s not “Do we have Threat Intelligence?”…

Medium
Detection Engineering: Practicing Detection-as-Code - Introduction - Part 1

Detection-as-Code Unveiled: Understand the methodologies and benefits of automating threat detection in this insightful blog series.

NVISO Labs
Detection as Code: A Maturity Framework

Detection as Code (DaC) is transforming how we handle threat detection by merging software engineering practices with security operations. Breaking down DaC into functional areas can enhance your organization's detection capabilities and maturity.

Catscrdl
A Five Year Retrospective on Detection as Code - Magonia Research

Five years ago, I co-authored the first public paper on the concept of Detection as Code. While having some technical peers review this paper, we found tha...

Magonia Research

SIEM 4.0: The Essentialist Evolution: https://jacknaglieri.substack.com/p/gen-4-siem

What to expect in SIEM 4.0:

- Prioritizing impactful MITRE tactics rather than complete ATT&CK coverage.

- Shifting from atomics to risk-based alerts that analyze groups of actions.

- Opening up the data lake and introducing new criteria for open data platforms.

- Controlling low-quality alerts through the adoption of “as code” principles.

- Using AI to automate routine tasks allows humans to focus on high-value work.

#siem #mitreattack #riskbased #DetectionAsCode

SIEM 4.0: The Essentialist Evolution

This blog explores the fourth generation of SIEM tooling and suggests an Essentialism approach to reducing alerts, logs, and bills.

Detection at Scale

Getting Started with Detection-as-Code and Chronicle Security Operations from David French:

- In Part 1 David shares the principles and benefits of managing detection rules as code, an example detection engineering workflow used by security teams, and how to configure a CI/CD pipeline job in GitLab to pull existing detection rules via Chronicle’s API and commit them to a GitLab project: https://www.googlecloudcommunity.com/gc/Community-Blog/Getting-Started-with-Detection-as-Code-and-Chronicle-Security/ba-p/702154

- In Part 2, he demonstrates how to create and modify detection rules via Chronicle’s API: https://www.googlecloudcommunity.com/gc/Community-Blog/Getting-Started-with-Detection-as-Code-and-Chronicle-Security/ba-p/702956

#DetectionAsCode #detectionengineering #chroniclesecurityoperations

In about 2 weeks we’re releasing something you might wanna see if you like #DetectionEngineering or #threatintel or #purpleteaming or #detectionascode -> TIDeMEC which implements #DetectionOps will be released at the FIRST Symphony Amsterdam

Ever wonder how #DetectionAsCode works, with a real sample process we had implemented - then check out an old #WhitePaper I wrote on the topic:

#Detection #UnitTest #Infosec #Cyber #DFIR

https://www.signalblur.io/detectors-as-code/

White Paper: Unit Testing Detection Logic

White Paper: Unit Testing Detection Logic Detectors as Code The Challenge of Detector Management

signalblur