LogicHub Resources

Filter:

Monitoring Files Written to USB

Automate baseline analysis of files copied to external drives, and alert on suspicious user behavior.

Top 10 Bank

Learn how this bank used Intelligent Automation to reduce alert triage workload and improve accuracy.

Maricopa Community Colleges

Learn how this college automated alert triage for all their suspicious login alerts after a Phishing attack.

Automating Threat Intelligence Searches

Automate the searching and enrichment of IOCs in threat intelligence feeds across your environment.

Automating Threat Hunting in AWS CloudTrail Logs

Automated threat hunting of AWS CloudTrail logs with LogicHub is a powerful and easy method to kick off your threat hunting campaigns by focusing on a smaller subset of important events.

Automating Threat Hunting in Web Proxy Logs

Automated threat hunting of proxy logs with LogicHub is a powerful and easy start to your threat hunting campaigns by focusing on a smaller subset of important events.

Buyer's Guide for Intelligent Security Automation

A complete set of resources for understanding, evaluating and implementing a security automation solution that is right for you.

SOC Automation Case Study: Maricopa Community Colleges

Learn how this college automated alert triage for all their suspicious login alerts after a Phishing attack.

5 Reasons Why Security Orchestration is Not Enough

The case for Intelligent Automation and why it is imperative to look beyond simple orchestration.

Build an AI Analyst to Eliminate Phishing Burden

Steps for building custom AI automation for phishing detection and response

Cutting Through the Artificial Intelligence Hype in Cybersecurity

Learn why AI is not the panacea it may seem, and why most machine learning is too early and undeveloped to match the expertise of skilled cyber analysts.

Measuring Threat Detection Effectiveness

Discover pragmatic strategies for measuring threats you're catching as well as those you're missing.

Transitioning the ISOC From Alerts to News

A step by step approach to transform to an Intelligence Driven Security Operations Center.

Solution Brief: LogicHub Overview

Learn how LogicHub provides powerful and complete automation for threat detection and response. 

How to get started with Security Automation and Orchestration

An excellent primer and discussion of best practices for implementing security automation

How to Automate Phishing Investigations

Get to Inbox Zero everyday with Automated Threat Ranking

How to Automate Threat Hunting

Do you have security event data but not enough threat visibility?

How to Secure GitHub with Automated Threat Detection

Your developers love managing their source code in GitHub.

The Complete Guide to Security Intelligence Automation

Everything you need to know about Security Intelligence Automation and why it is critical for effective threat detection.

Beyond Security Orchestration - The Urgent Need for Intelligent Automation

When it comes to security automation, you’re not limited to simple orchestration.

Request a Demo

Request a Demo