Gigamon ThreatINSIGHT™ is built by responders, for responders. Our security researchers, engineers and analysts deliver first-hand knowledge of leading-edge detection capabilities based on years of hands-on experience in the field. The collection of network detection and response (NDR) resources below will elevate perceptions, and provide a deeper understanding of the essentials of security analysis, threat hunting and incident response.
BLOGS
ABADBABE 8BADF00D: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling
Adobe Flash Zero-Day Exploited in the Wild
Emotet: Not Your Run-of-the-Mill Malware
Gigamon Applied Threat Research (ATR) Blog
Malicious Chrome Extensions Enable Criminals to Impact Half a Million Users and Global Businesses
Parental Monitoring Gone Bad — Analysis of an Unassuming Mobile Threat
TALKS
BLOGS
Breach Whale: Optimizing Incident Response to Get Your Business Swimming Again
Leave Your Enchanted Sword at the Door: Turning Your SOC into an RPG
Quality Control: Keeping Your Detections Fresh
So, you want to be a detection engineer?
REFERENCE GUIDES
INSIGHT Query Language (IQL) Quick Reference Guide
TALKS
Encrypted Things - Network Detection and Response in an Encrypted World
WEBINAR
SANS Ransomware Prevention Report: How to Address a Pervasive and Unrelenting Threat
To Whack or Not to Whack - Incident Response and Breach Mitigation
Zero Trust: What You Need to Know to Secure Your Data and Networks (SANS)
WHITEPAPER
Guide to Zero Trust for Federal Agencies
SANS Ransomware Prevention Report: How to Address a Pervasive and Unrelenting Threat
Learn more about how you can optimize your incident response and security operations and connect with other Gigamon users to ask questions and share use cases and deployment examples.