Sitemap
- / 37 pages
- MDR, SOAR, AI Automation Solutions
- MDR, SOAR, AI Automation Solutions
- Adaptable automation-driven detection and response solutions
- integrations
- Resources | LogicHub®
- Video FAQ and Resource Library for Security Automation
- Resources | LogicHub®
- Blog | LogicHub®
- Newsletter - Security Roundup | LogicHub®
- Company | LogicHub®
- Customer Success | LogicHub®
- Careers | LogicHub®
- LogicHub News
- Contact LogicHub
- Privacy Policy | LogicHub®
- Terms | LogicHub®
- Privacy Policy | LogicHub®
- Terms | LogicHub®
- LogicHub Security Roundup: December 2020 | LogicHub®
- The LogicHub Security Roundup: January 2021 | LogicHub®
- LogicHub Security Roundup: February 2021 | LogicHub®
- LogicHub Security Roundup: March 2021 | LogicHub®
- LogicHub Security Roundup: April 2021 | LogicHub®
- The LogicHub Security Roundup: May 2021 | LogicHub®
- The LogicHub Security Roundup: June 2021 | LogicHub®
- The LogicHub Security Roundup: July 2021 | LogicHub®
- The LogicHub Security Roundup: August 2021 | LogicHub®
- The LogicHub Security Roundup: September 2021 | LogicHub®
- The LogicHub Security Roundup: October 2021 | LogicHub®
- The LogicHub Security Roundup: November 2021 | LogicHub®
- The LogicHub Security Roundup: December 2021 | LogicHub®
- The LogicHub Security Roundup: January 2022 | LogicHub®
- The LogicHub Security Roundup: Fabruary 2022 Edition | LogicHub®
- The LogicHub Security Roundup: March 2022 Edition | LogicHub®
- The LogicHub Security Roundup: April 2022 Edition | LogicHub®
- The LogicHub Security Roundup: December 2021 | LogicHub®
- Default HubSpot Blog
- blog-default/ 2 pages
- Sample - How To Post
- Default HubSpot Blog
- author/ 1 pages
- Default HubSpot Blog | Sample HubSpot User
- topic/ 1 pages
- Default HubSpot Blog | Insider
- blog/ 70 pages
- LogicHub Security Roundup: April 2022
- Under the Wire: Evading Censorship & Protecting Sensitive Information
- Weathering Russian Winter: The Current State of Russian APTs
- The Evolution from SIEM to AI Driven Automation
- Drawing the RedLine - Insider Threats in Cybersecurity
- Announcing the Free Edition of LogicHub SOAR
- Improving Security and Reducing Costs Through AI-based Attack Detection
- Log4J Library Zero-Day Breakdown: Analysis and Remediation
- How to Protect Yourself from Ransomware on a Budget
- Social Deficit: Automating Against Social Engineering
- 6 Critical Components of Effective eXtended Detection and Response (XDR)
- The need for consolidated detection and response
- XDR? SOAR? Is there a difference?
- Why it’s time to for a new approach to SIEM
- PrintNightmare Breakdown: Analysis and Remediation
- Reducing Alert Fatigue with Automation
- Extracting value from legacy firewall logs
- How to implement MITRE ATT&CK based detection and response in under 30 days
- Why you should consider phishing triage as a service
- Part 2: How to Respond to Attack
- Dissecting Ransomware: How Hostage Data Leaks Secrets and Causes Devastation: Part 1
- Accelerating Case Investigations with Automated Commands
- 5 Essential Metrics for Measuring Detection and Response Efficacy
- How to determine your level of exposure
- The Gartner 2020 Market Guide for Security Orchestration, Automation and Response
- This Week in Security 2020.09.02
- Security Automation So Easy a 6 Year Old Can Do It
- Leveraging Security Automation to Merge CrowdStrike, Okta and Active Directory into a Single Incident Response Playbook
- G-Suite Account Takeover Detection and Response - Part 1
- LogicHub Accelerates Journey Toward Automated Security Operations with MDR+
- SOAR+ Series: The Evolution of SOAR Is Empowering Security Analysts Like Never Before
- Gone Phishing: LogicHub Sends the Machines with Autonomous Phishing Triage
- 5 Things that SOCs Should Know About Ransomware
- SOAR+ Series: Recommendations Make Building Playbook Flows Fast and Easy
- SOAR+ Series: Why SOAR Needs Machine Learning
- Outcome-Oriented SOAR Implementation
- SOAR+ Series: Why SOAR+ Requires Advanced Analytics
- SOAR+ Series: Autonomous Threat Detection Helps SOCs Keep Companies Safe
- LogicHub’s Windows Process Creation Events Playbook and MITRE ATT&CK
- LogicHub Redefines The SOAR Category With SOAR+
- Accelerate Phishing Triage
- 7 Ways to Make the Most of Baselines for Threat Detection
- How to Use Machine Learning to Make Your Security Automation Platform Smarter
- What Is SOAR? And What to Know Before You Buy
- How to Measure and Improve Decision Automation for Cybersecurity (Next Gen SOAR)
- Overcoming SOAR hurdles with Security Automation on Demand
- Data Breaches Are Taking Longer to Detect and Contain
- RSA Attendee Survey Highlights Need for Security Automation and Threat Hunting
- Introducing ThreatGPS for GitHub
- Why GitHub Could Be Your Weakest Link and How to Protect Your Organization
- Cybersecurity readiness starts with smarter investments
- SOAR back-to-basics: People, process, technology of the automated SOC
- Can we really automate how security analysts think?
- Security automation or bust: Why SecOps analysts cannot do it alone
- How security automation elevates the role of the human analyst
- False negatives: The silent killers of the sec ops world
- What CISOs Need to Know about the Psychology behind Security Analysts
- How cognitive and robotic automation play in SecOps
- Getting the most out of your SIEM investment
- Why automation isn’t everything in cybersecurity
- Removing Haystacks to Find Needles
- Continuous Threat Detection
- We put Security Analysts through Blue Team Training…Here’s what happened
- If Incident Response Automation is Hot, Threat Detection Automation is Sizzling
- Introducing LogicHub™
- 5 Key Limitations of Doing Threat Detection with Rules
- SIA: Scaling Human Security Intelligence with Automation
- PrintNightmare Breakdown: Analysis and Remediation
- Drawing the RedLine - Insider Threats in Cybersecurity
- Improving Security and Reducing Costs Through AI-based Attack Detection
- author/ 12 pages
- Blog | LogicHub® | Tessa Mishoe
- Blog | LogicHub® | Kumar Saurabh
- Blog | LogicHub® | Ryan Thomas
- Blog | LogicHub® | Willy Leichter
- Blog | LogicHub® | Kevin Broughton
- Blog | LogicHub® | Anthony Morris
- Blog | LogicHub® | Tom D'Aquino
- Blog | LogicHub® | Glenn Gauvin
- Blog | LogicHub® | Evan Gaustad
- Blog | LogicHub® | Hormazd Romer
- Blog | LogicHub® | Monica Jain
- Blog | LogicHub® | Sample HubSpot User
- kumar-saurabh/
- tessa-mishoe/
- tag/ 26 pages
- Blog | LogicHub® | AI
- Blog | LogicHub® | Alert Triage
- Blog | LogicHub® | Analytics
- Blog | LogicHub® | APT
- Blog | LogicHub® | Automation
- Blog | LogicHub® | censorship
- Blog | LogicHub® | Encryption
- Blog | LogicHub® | Insider Threat
- Blog | LogicHub® | Machine Learning
- Blog | LogicHub® | Malware
- Blog | LogicHub® | MDR+
- Blog | LogicHub® | MITRE ATT&CK
- Blog | LogicHub® | Phishing Triage
- Blog | LogicHub® | Playbooks
- Blog | LogicHub® | Recommendations
- Blog | LogicHub® | RedLine Password Theft Malware
- Blog | LogicHub® | Security News
- Blog | LogicHub® | SIEM
- Blog | LogicHub® | SOAR
- Blog | LogicHub® | SOC
- Blog | LogicHub® | Social Engineering
- Blog | LogicHub® | Surveillance
- Blog | LogicHub® | Threat Detection
- Blog | LogicHub® | Threat Hunting
- Blog | LogicHub® | VPN
- Blog | LogicHub® | XDR
- careers/ 3 pages
- MDR Analyst
- Sr. MDR Analyst
- Sales Development Representative (SDR)
- logichub-news/ 4 pages
- LogicHub Press Release - LogicHub Launches Free SOAR Edition
- Gartner Report Demand-Side Innovator for AI in Attack Detection 2021
- LogicHub Press Release - 2022 Cybersecurity Excellence Awards
- LogicHub 2022 Cybersecurity Excellence Awards
- products/ 2 pages
- Artificial Intelligence Threat Detection
- Product Use Cases | LogicHub®
- use-cases/ 28 pages
- Automatically Quarantining Infected Hosts | LogicHub®
- Automating EDR Alert Triage | LogicHub®
- Automating Phishing Triage | LogicHub®
- Automating SIEM Alert Triage | LogicHub®
- Detecting and Disabling Compromised Credentials | LogicHub®
- Detecting Exposed AWS Keys | LogicHub®
- Hunting for insider threats | LogicHub®
- Malicious Powershell Commands | LogicHub®
- Managed O365 detection and response | LogicHub®
- Threat Hunting in Github | LogicHub®
- Using TIP to Automatically Triage Network Events More Accurately | LogicHub®
- Managed Detection and Response for G-Suite | LogicHub®
- MDR After Hours Incident Response | LogicHub®
- Automatically respond to user reported incidents | LogicHub®
- Automatically Quarantining Infected Hosts | LogicHub®
- Automating EDR Alert Triage | LogicHub®
- Automating Phishing Triage | LogicHub®
- Automating SIEM Alert Triage | LogicHub®
- Detecting and Disabling Compromised Credentials | LogicHub®
- Detecting Exposed AWS Keys | LogicHub®
- Hunting for insider threats | LogicHub®
- Malicious Powershell Commands | LogicHub®
- Managed O365 detection and response | LogicHub®
- Threat Hunting in Github | LogicHub®
- Using TIP to Automatically Triage Network Events More Accurately | LogicHub®
- Managed Detection and Response for G-Suite | LogicHub®
- MDR After Hours Incident Response | LogicHub®
- Automatically respond to user reported incidents | LogicHub®