{"id":25928,"date":"2019-03-05T19:30:00","date_gmt":"2019-03-05T19:30:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/care-and-feeding-of-your-siem-\/a\/d-id\/1334002"},"modified":"2019-03-05T19:30:00","modified_gmt":"2019-03-05T19:30:00","slug":"care-and-feeding-of-your-siem","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/","title":{"rendered":"Care and Feeding of Your SIEM"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">Six simple steps to mitigate the grunt work and keep your organization safe.<\/span> <\/p>\n<p class>System information and event management (SIEM) systems and intrusion detection and prevention systems (IDS\/IPS) are our frontline defenses in an increasingly hostile world. As effective as they seem, if they&#8217;re not properly configured and maintained, they can become essentially useless.<\/p>\n<p>Part of the problem is that this work isn&#8217;t sexy or easy \u2014 it&#8217;s basically digital sanitation. But it&#8217;s extremely important. Imagine what would happen if your company&#8217;s garbage suddenly stopped being collected. While SIEM\/IDS\/IPS maintenance isn&#8217;t quite as stinky, it&#8217;s very similar. Networks change. Threat landscapes change. Most IDS rule sets don&#8217;t change (other than getting bigger). Software or services stop being used. And unfortunately, somebody needs to paw through your SIEMS&#8217;s entrails to find these things.<\/p>\n<p>There are a few ways to mitigate the grunt work to make the task more manageable for your security engineers.<\/p>\n<p><strong>1.&nbsp;<\/strong><strong>Roll Out Slowly<br \/><\/strong>If you are just rolling out your SIEM\/IDS\/IPS system, avoid turning on everything at once \u2014 this is a major mistake. Turn on subnets or VLANs one by one \u2014 tuning as you go. A SIEM throwing out 100 alerts in a day is a sure bet of burning out your security analysts quickly, and pretty much ensures overly liberal whitelists will quickly become commonplace.<\/p>\n<p><strong>2.&nbsp;<\/strong><strong>Good Documentation<br \/><\/strong>Make sure every rule set added is documented (and reviewed by someone) when it is added. And make sure the documentation is complete. The &#8220;magic whitelist&#8221; is routinely encountered when doing audits. Such an incomplete entry usually happens at 4:59 p.m. on a Friday afternoon filled with false positives. Unfortunately, Monday rolls around and the whitelist isn&#8217;t updated, and months later a similar alert is triggered. Make sure your documentation is precise and helpful. Don&#8217;t allow any ambiguity. If something is a false positive, explain why.<\/p>\n<p><strong>3.&nbsp;<\/strong><strong>Fine Tune (Preferably the First Time)<br \/><\/strong>Don&#8217;t rush through the configuring of your baseline \u2014 no matter how long it takes. Tuning out the legitimate false positives while taking the time to thoroughly investigate each alert is important. The more granular you can get your rule sets, the better. If you can pinpoint false positives from specific machines in a subnet, exclude the machines and not the subnet.<\/p>\n<p>Remember that you are doing this not only to find stale or overly liberal policies but to improve performance. Your SIEM\/IDS needs to process every single rule it encounters, so the more rules you have, the slower your device will be. Look for ways you can consolidate rules wherever possible \u2014 and toss the chaff.<\/p>\n<p><strong>4.&nbsp;<\/strong><strong>Frequent Auditing<br \/><\/strong>Make auditing a regular exercise. Instead of leaving the entire task to be done once a year, make the process a monthly or bimonthly process. Tie changes into a change control process wherever possible. If changes are made on the fly, make sure they are still entered into the change registry as an emergency modification. I can&#8217;t stress enough how important building and maintaining a robust change control framework is; not only will it help drive security, your entire IT infrastructure will benefit.<\/p>\n<p>Wherever possible, use this audit phase to help build or validate your configuration management database\/asset tracking process. When you encounter a system, you should be able to identify what OS\/apps\/data are on this box, who is the point of contact, and ideally who the data custodian for the box is. This will drive not only security and business continuity processes, and improve efficiencies for the IT group as well.<\/p>\n<p><strong>5.&nbsp;<\/strong><strong>Validate Log Flows<br \/><\/strong>Make sure you routinely validate that traffic from all devices is still inbound. Often, outages of a significant period get silenced \u2014 only to not be turned back on when the outage is resolved. I&#8217;ve seen a company go well over a year before realizing there were no alerts triggering in their SIEM from an entire branch location.<\/p>\n<p><strong>6.&nbsp;<\/strong><strong>Check Your Capacity<br \/><\/strong>When establishing or reviewing your SIEM, be sure that your storage capacity is appropriate for your logs. A lot of solutions base their pricing on consumption \u2014 a cap on events per second, for example. Sometimes, companies decide to limit what they are logging in an event to keep pricing to a minimum. This can be a crucial mistake. Many&nbsp;\u2014 probably most \u2014 penetrations of networks initially occur on individual user machines rather than on critical systems. If you are monitoring only critical or major systems to save money, you might very well be missing all the initial warning signals of the initial intrusion. Your first indication might end up being when you see your database being sent across the wire.<\/p>\n<p>Proper capacity doesn&#8217;t just apply to the size of the SIEM&#8217;s hard drives. It is critical to ensure that you have adequate staffing for deploying and maintaining a SIEM. Don&#8217;t underestimate the manpower required when you budget for operations.<\/p>\n<p>A properly configured and maintained SIEM\/IDS can help save your bacon. But as you&#8217;ve seen here, they aren&#8217;t devices you can simply deploy and forget about. They can be a big financial and logistical burden, but if you follow the tips discussed above, they can also be your company&#8217;s best friend.<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<div readability=\"7.3220338983051\">\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/INT19-Logo-HorizDates-3035.png\" alt width=\"360\" height=\"48\"><\/p>\n<p><em><strong>&nbsp;<\/strong><\/em><\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><strong>Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry&#8217;s most knowledgeable IT security experts. Check out the <a href=\"https:\/\/www.interop.com\/darkreading\/?_mc=hsad_x_drr_le_tsnr_intplv_x_x-drvplug\" target=\"_blank\">Interop&nbsp;agenda<\/a> here.<\/strong><\/p>\n<\/div>\n<p><span class=\"italic\">Shane MacDougall is Senior Security Engineer at Mosaic451, a managed cybersecurity service provider (MSSP) and consultancy with specific expertise in building, operating, and defending some of the most highly secure networks in North America. <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=5147\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/care-and-feeding-of-your-siem-\/a\/d-id\/1334002?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Six simple steps to mitigate the grunt work and keep your organization safe. Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/care-and-feeding-of-your-siem-\/a\/d-id\/1334002?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-25928","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Care and Feeding of Your SIEM 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Care and Feeding of Your SIEM 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-05T19:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/INT19-Logo-HorizDates-3035.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Care and Feeding of Your SIEM\",\"datePublished\":\"2019-03-05T19:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/\"},\"wordCount\":966,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/INT19-Logo-HorizDates-3035.png\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/\",\"name\":\"Care and Feeding of Your SIEM 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/INT19-Logo-HorizDates-3035.png\",\"datePublished\":\"2019-03-05T19:30:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/#primaryimage\",\"url\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/INT19-Logo-HorizDates-3035.png\",\"contentUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/INT19-Logo-HorizDates-3035.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/care-and-feeding-of-your-siem\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Care and Feeding of Your SIEM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Care and Feeding of Your SIEM 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/","og_locale":"en_US","og_type":"article","og_title":"Care and Feeding of Your SIEM 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-05T19:30:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/INT19-Logo-HorizDates-3035.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Care and Feeding of Your SIEM","datePublished":"2019-03-05T19:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/"},"wordCount":966,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/INT19-Logo-HorizDates-3035.png","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/","url":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/","name":"Care and Feeding of Your SIEM 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/INT19-Logo-HorizDates-3035.png","datePublished":"2019-03-05T19:30:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/INT19-Logo-HorizDates-3035.png","contentUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/INT19-Logo-HorizDates-3035.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/care-and-feeding-of-your-siem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Care and Feeding of Your SIEM"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25928"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25928\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}