Our Blog

Event properties in Qradar

In IBM QRadar, Event Properties are crucial elements used to define and analyze security events. Each event in QRadar contains a set of properties that helps you understand the context of the event,...

The cyber kill Chain

Foundation of Cyber Kill ChainThe Cyber Kill Chain is a security model originally developed by Lockheed Martin to describe the stages of a cyberattack. It's widely used to help organizations...

Foundations of MITRE ATT and CK v13

Foundations Of MITRE ATT and CK v13The MITRE ATT&CK Framework is a globally recognized cybersecurity model that provides a detailed matrix of tactics, techniques, and procedures (TTPs) used by...

Sending Linux Logs to IBM QRadar

Sending Linux Logs to QradarSending Linux Logs to IBM Qradar is a complex process for beginners . Its a process of collecting and forwarding Linux system logs to a Qradar SIEM platform. This enables...