A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive - Matthew Gracie BSides Cleveland 2019 (Hacking Illustrated Series InfoSec Tutorial Videos)

The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive
Matthew Gracie

@infosecgoon

There are many sources of threat intelligence out there - so many that it can easily become overwhelming. This talk covers a set of open source tools (including MISP, Security Onion, and TheHive) that can be leveraged to organize, normalize, and distribute threat intelligence in your environment for efficient threat hunting and response.

Matthew Gracie has over a decade of experience in information security, working to defend networks in higher education, manufacturing, and financial services. He is currently an Information Security Engineer with BlueCross BlueShield of Western New York. Matt enjoys good beer, mountain bikes, Debian-based Linux distributions, and college hockey, and can be found on Twitter as @InfosecGoon.


Back to BSides Cleveland 2019 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast