What’s shared on the community?
SecOps Strategies and Tips
Automation Playbooks and Scripts
Open Source Tools and Suggestions
Incident Response Best Practices
Who’s part of SecOps Hub?
Community members come from a broad spectrum of backgrounds, with a shared passion for learning about and discussing information security and industry best practices. Our users range from beginners to advanced developers, industry thought leaders, information security veterans, and recent certification program and college graduates.
Why join SecOps Hub?
Discuss anything related to security operations, incident response, security strategies, and best practices.
Share your expertise with industry peers.
Learn from industry experts.
Expand and solidify your knowledge and skills with various open-source tools.
Propel your professional growth and make new connections across the globe.
Influence the outcome of your work and solve problems on your own – with help from other security pros!
Clustering and neo?
@Java wrote: Does anyone have any best practices around clustering and Neo? I’m using a 3 server cluster for Neo and Mongo. Mongo is good to go, but in the event of the primary Neo going down, do I just need to manually change the app settings file and neo config? […]
Indicators and network defense
@Emmaf wrote: Stranded on Pylos – 16 May 18 Indicators and Network Defense When I led incident response operations at Los Alamos National Laboratory, we subscribed to several ‘threat intelligence’ feeds: big commercial providers, secret-squirrel […]
Hi, newbie here!
@AAB wrote: Hello everyone! I met some awesome people from Secops hub at RMISC. I’m fairly new to Security and pure IT formats, but have 18 years Technical exp. in various technolgy roles. I’m currently enrolled in a B.S in CyberSecurity and Information […]
Are we 'Cramming' too much into DNS in the name of security
@nihalpasham wrote: As part of a plan to overhaul some of our DNS infrastructure, we began assessing the current threat landscape and our exposure. We started with a table of potential attack vectors and clearly volumetric (DDoS) attacks aren’t the […]
Recap with presenter- California Technology Summit--Open source tools & automation
@Emmaf wrote: Q: Hi @MisterShak you recently presented at California Technology Summit. What did you talk about? A: I talked about how bringing in Open Source tools and Automation can drastically change the effectiveness of a SOC. Q: Was this your first time presenting at […]
Lojack Double Agent
@seag33k wrote: They said that due to Lojack software being trusted by most AV solutions, these tainted version are being missed. Their suggestion is to use Yara to scan Lojack agents. I haven’t used Yara before, but wondered if comparing the hash value of the […]
Thug, a Python low-interaction honeyclient--do you use this tool?
@Emmaf wrote: http://thug-honeyclient.readthedocs.io/en/latest/intro.html Do you use this tool^? What do you use it for? Posts: 1 Participants: 1 Read full topic […]
BSides Charm 2018 Security Conference Videos
@J_Geno wrote: Link to Videos:YouTube Adrian Crenshaw What What? Conference Talks: Track 1 13 Closing Ceremonies Track 2 09 Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell Track 1 12 Adding Simulated Users to Your […]