Part 3 : Respond and protect with a multi-pronged automated approach
Tutorials

Part 3 : Respond and protect with a multi-pronged automated approach

This is part 3 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 2 : Enrich alerts, avoid toil, and regain control during incidents
Tutorials

Part 2 : Enrich alerts, avoid toil, and regain control during incidents

This is part 2 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 1 : Breaches are inevitable and early detection is crucial
Tutorials

Part 1 : Breaches are inevitable and early detection is crucial

This is part 1 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines