Our Blog
Creating Custom Rules in QRadar: A Detailed Guide
Creating Qradar Custom RulesQradar Rules are predefined or custom-defined conditions that trigger alerts or notifications when specific events occur within the monitored environment. These rules...
Event properties in Qradar
In IBM QRadar, Event Properties are crucial elements used to define and analyze security events. Each event in QRadar contains a set of properties that helps you understand the context of the event,...
The cyber kill Chain
Foundation of Cyber Kill ChainThe Cyber Kill Chain is a security model originally developed by Lockheed Martin to describe the stages of a cyberattack. It's widely used to help organizations...
Foundations of MITRE ATT and CK v13
Foundations Of MITRE ATT and CK v13The MITRE ATT&CK Framework is a globally recognized cybersecurity model that provides a detailed matrix of tactics, techniques, and procedures (TTPs) used by...
Sending Linux Logs to IBM QRadar
Sending Linux Logs to QradarSending Linux Logs to IBM Qradar is a complex process for beginners . Its a process of collecting and forwarding Linux system logs to a Qradar SIEM platform. This enables...