This episode currently has no reviews.
Submit ReviewRick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of “eXtended Detection and Response” (XDR) with CyberWire Hash Table guests Rick Doten, Centene’s VP of Security, and Milad Aslaner, Sentinel One’s XDR Product Manager.
Daniel Suarez, 2006. Daemon [Book]. Goodreads.
White-Paper-Intel-Driven-Defense.pdf">Eric Hutchins, Michael Cloppert, Rohan Amin, 2010, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Paper] Lockheed Martin Corporation.
Nir Zuk, 2018. Palo Alto Networks Ignite USA ’18 Keynote [Presentation]. YouTube.
Raffael Marty, 2021. A history lesson on security logging, from syslogd to XDR [Essay]. VentureBeat.
Rick Howard, 2020. Daemon [Podcast]. Word Notes.
Staff, n.d. Open Cybersecurity Schema Framework [Standard]. GitHub.
Staff, 2019. What is EDR? Endpoint Detection & Response Defined [Explainer]. CrowdStrike.
Staff, 2020. Log Formats – a (Mostly) Complete Guide [Explainer]. Graylog.
event-format-cef.html">Stephen Watts, 2023. Common Event Format (CEF): An Introduction [Explainer]. Splunk.
Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode currently has no reviews.
Submit ReviewThis episode could use a review! Have anything to say about it? Share your thoughts using the button below.
Submit Review