-

Implementing MITRE D3FEND for ATT&CK Technique T1059: Command and Scripting Interpreter
Command and Scripting Interpreter attacks were the second most common technique seen in MITRE’s Engenuity’s Sightings Ecosystem report, representing 15.77% of 1.1 million sightings. MITRE’s…
-

Implementing MITRE D3FEND for ATT&CK Technique T1053: Scheduled Task/Job
Scheduled task/job threats, which make up MITRE ATT&CK Technique T1053, can have severe implications for an organization’s security. MITRE also outlines how to address this…
-

How SOAR and OSINT Work Together
The collection and analysis of open-source threat intelligence (OSINT) are valuable stages in incident response. However, with large datasets and alert volumes, this process becomes…
-

How to Automate Incident Response to MITRE ATT&CK Technique T1003: OS Credential Dumping
In this blog post, we will outline four incident response playbooks for MITRE ATT&CK Technique T1003: OS Credential Dumping. Credential Dumping is a technique that…
-

Why Smart SOAR is the Best SOAR for Trellix (formerly McAfee) Endpoint Security
Trellix (formerly McAfee) Endpoint Security and Smart SOAR combine to produce a unified threat management and incident response system. Security teams may be looking for…
-

Enable Two-Tiered Automation for Incident Response with Smart SOAR’s Event Playbook
Incident response is a critical process for any organization to minimize the impact of cyber attacks. However, there are two key challenges faced in this…
-

Why D3 Smart SOAR is the Best Independent SOAR for FortiGate and FortiMonitor
D3 Security’s Smart SOAR (security orchestration, automation, and response) is a robust platform designed to integrate disparate security tools and streamline incident response workflows. FortiGate…
-

Never Write Another Incident Report Again with Smart SOAR
Writing reports is an important, but tedious, step in the incident response process. In Smart SOAR, all incidents can be automatically exported as professionally designed…
