Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Detecting Ransomware Before It’s Too Late Using MITRE ATT&CK Randy Franklin Smith, Ultimate Windows Security; Michael McGinnis, LogRhythm Good backups are not the solution to ransomware. Backups take time – time when your business is in complete limbo because it chose to completely shut ... 2 years ago | 77 mins Keeping Pace with Ransomware Tactics and Strategies: Lessons Learned from 1 Year Randy Franklin Smith (Ultimate Windows Security) and Brian Coulson (LogRhythm) Today, ransomware attackers won’t simply back down if an organization refuses to pay the demanded sum in order to get their files back. Even companies... 3 years ago | 69 mins What is MITRE Attack? Randy Franklin Smith, Ultimate Windows Security and Brian Coulson, LogRhythm MITRE ATT&CK is a knowledge base and framework that lists and details adversary tactics and techniques within a common taxonomy. Having a taxonomy by ... 3 years ago | 103 mins Understanding Office 365 Unified Audit Logging Randy Franklin Smith, Ultimate Windows Security subject matter expert, and Bruce Deakyne, LogRhythm technical product manager Office 365 provides a centralized audit logging facility that allows you to track what’s happening in Azure Active Directory, Exchange Online, SharePo... 6 years ago | 90 mins An introduction to MITRE ATT&CK Randy Franklin Smith, Ultimate Windows Security and Brian Coulson, LogRhythm MITRE ATT&CK is a knowledge base and framework that lists and details adversary tactics and techniques within a common taxonomy. Having a taxonomy by ... 4 years ago | 89 mins Top Windows Security Logs for UEBA Randy Franklin Smith, Windows Security Expert (UWS); Matt Willems, Technical Product Manager (LogRhythm) User and entity behaviour analytics (UEBA) and security information and event management (SIEM) are separate security solutions that can work together... 5 years ago | 105 mins Seeing Inside Encrypted Traffic Randy Smith - Ultimate Window Security; Parth Jagirdar - A10 Networks Most of the traffic flowing through your firewall today is encrypted. In some ways that’s a good thing because encryption enables businesses to commun... 5 years ago | 90 mins An Inside Look: Top Windows Logs for User Behavior Analysis Randy Franklin Smith, Windows Security Expert (UWS); Matt Willems, Technical Product Manager (LogRhythm) User and entity behavior analytics (UEBA) and security information and event management (SIEM) are separate security solutions that can work together ... 5 years ago | 105 mins Kubernetes audit logging and container security Randy Franklin Smith, Ultimate Windows Security and Rich Bakos and Kyle Senescu, LogRhythm Applications are increasingly being containerised and when that happens, they invariably find their way to a Kubernetes cluster. The security relation... 4 years ago | 84 mins Demystifying Kubernetes Vulnerabilities & Their Relationship to Risk Management Dane Grace, Technical Product Manager at Rapid7 and Nick Cavalancia, Cybersecurity Expert at Ultimate Windows Security Containerizing applications has grown in popularity over the years, making Kubernetes a core part of an organization’s critical workloads. Because the... 2 years ago | 59 mins Load more