Ed Bailey (@ebailey1367) 's Twitter Profile
Ed Bailey

@ebailey1367

I love SIEM data architecture, let’s talk about options - IT ops nerd - Logging nut - Dad to Marie - Husband to Jessica. “opinions are my own”

ID: 822028597

calendar_today13-09-2012 19:03:57

5,5K Tweet

574 Followers

2,2K Following

Lee Roach (@leevalueroach) 's Twitter Profile Photo

Of course that’s your contention. You’re a first-year deep value investor. You just finished The Intelligent Investor, think net-nets are a cheat code, and you’re tweeting P/B ratios like they’re scripture. Right now, it’s all about Ben Graham, "margin of safety," "cigar

Of course that’s your contention. You’re a first-year deep value investor.

You just finished The Intelligent Investor, think net-nets are a cheat code, and you’re tweeting P/B ratios like they’re scripture.

Right now, it’s all about Ben Graham, "margin of safety," "cigar
rcegan (@rcegann) 's Twitter Profile Photo

New post up on detect.fyi all about SIEM documentation best practice from the perspective of someone who is really particular about it I promise it's more interesting than that as we get into using doco to do thrunting, mitre alignment..... detect.fyi/do-you-know-yo…

Ed Bailey (@ebailey1367) 's Twitter Profile Photo

This is my favorite new feature in a long time. CoPilot Editor makes mapping data to standard schemas super easy. It takes 10 mins to map firewall data to the OCSF network schema, with most of the time spent on validation. Other common schemas will be supported in the near

The Hacker News (@thehackersnews) 's Twitter Profile Photo

A critical flaw in Wazuh Server (CVE-2025-24016) is being actively exploited to drop multiple Mirai botnet variants—sparking massive DDoS attacks worldwide. Millions of IoT devices remain vulnerable, fueling relentless botnet growth and escalating global cyber threats. Details

NSA Cyber (@nsacyber) 's Twitter Profile Photo

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…
Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

"Real Time Detection & Response" - Something happens on the system a log gets generated. (fraction of milliseconds are lost) - An local engine matches on it and generate something to send (a couple more milliseconds / seconds are lost) - Time to send that thing to the other

Security Onion (@securityonion) 's Twitter Profile Photo

Security Onion 2.4.160 now available including Playbooks, Guided Analysis, MCP Server, and more! Have you ever had an alert and were unsure of what to do next? In this release, when you expand an alert you'll see a new tab called Guided Analysis. This leverages Playbooks to show

Security Onion 2.4.160 now available including Playbooks, Guided Analysis, MCP Server, and more!

Have you ever had an alert and were unsure of what to do next? In this release, when you expand an alert you'll see a new tab called Guided Analysis. This leverages Playbooks to show
David Weston (DWIZZZLE) (@dwizzzlemsft) 's Twitter Profile Photo

My new blog covering user-mode EDR/AV platform and changes to Windows (including the death of the BSoD!!) blogs.windows.com/windowsexperie…

Alex Elliott (@alexpotato) 's Twitter Profile Photo

Have a couple security roles open at a well funded startup. Anyone interested or folks you recommend? (Priority will probably go to mutuals)

Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

As detection engineers we are limited by the capabilities of the tooling we work with, be it the query language or the collected telemetry and even our own knowledge of topics. The way one models a detection is also directly influenced by their role in the chain, the type of

Cribl (@cribl_io) 's Twitter Profile Photo

📽️ TODAY at 2:06pm ET, tune in to #SecurityLIVE! from AWS Partner Summit NYC! Hear how Cribl + Amazon Web Services are helping customers rethink their data strategy by making it easier to modernize, reduce complexity, and unlock long-term flexibility. Watch here: bit.ly/40Rx6r3

📽️ TODAY at 2:06pm ET, tune in to #SecurityLIVE! from AWS Partner Summit NYC!

Hear how Cribl + <a href="/AWS/">Amazon Web Services</a> are helping customers rethink their data strategy by making it easier to modernize, reduce complexity, and unlock long-term flexibility.

Watch here: bit.ly/40Rx6r3