by Martin Potgieter | Dec 13, 2019 | Blog
The basis of threat detection inย security operations centresย over theย pastย decadeย hasย predominantlyย relied onย rules, commonly defined by SIEM vendors.ย Theseย โrulesโ (also called alarms, alerts or use cases depending on the SIEM vendor,ย or asย we prefer to callย them...