SecOps Hub is a community of security pros gathered to discuss SecOps strategies, incident response best practices, and ways to simplify it all with security automation and orchestration. Although Swimlane is proud to be hosting the community, and our in-house security experts contribute to many discussions, SecOps Hub is an open forum. Everyone is welcome to join and encouraged to contribute.
VISIT SECOPS HUB

What’s shared on the community?

SecOps Solutions
SecOps Strategies and Tips
Scripts
Automation Playbooks and Scripts
Incident Response Tools
Open Source Tools and Suggestions
Best Practice
Incident Response Best Practices

Who’s part of SecOps Hub?

Community members come from a broad spectrum of backgrounds, with a shared passion for learning about and discussing information security and industry best practices. Our users range from beginners to advanced developers, industry thought leaders, information security veterans, and recent certification program and college graduates.

Why join SecOps Hub?

  • Discuss anything related to security operations, incident response, security strategies, and best practices.
  • Share your expertise with industry peers.
  • Learn from industry experts.
  • Expand and solidify your knowledge and skills with various open-source tools.
  • Propel your professional growth and make new connections across the globe.
  • Influence the outcome of your work and solve problems on your own – with help from other security pros!

Recent Discussions

  • Clustering and neo?

    @Java wrote: Does anyone have any best practices around clustering and Neo? I’m using a 3 server cluster for Neo and Mongo. Mongo is good to go, but in the event of the primary Neo going down, do I just need to manually change the app settings file and neo config? […]

  • Indicators and network defense

    @Emmaf wrote: Stranded on Pylos – 16 May 18 Indicators and Network Defense When I led incident response operations at Los Alamos National Laboratory, we subscribed to several ‘threat intelligence’ feeds: big commercial providers, secret-squirrel […]

  • Hi, newbie here!

    @AAB wrote: Hello everyone! I met some awesome people from Secops hub at RMISC. I’m fairly new to Security and pure IT formats, but have 18 years Technical exp. in various technolgy roles. I’m currently enrolled in a B.S in CyberSecurity and Information […]

  • Are we 'Cramming' too much into DNS in the name of security

    @nihalpasham wrote: As part of a plan to overhaul some of our DNS‍ infrastructure‍, we began assessing the current threat‍ landscape and our exposure. We started with a table of potential attack vectors and clearly volumetric (DDoS) attacks aren’t the […]

  • Recap with presenter- California Technology Summit--Open source tools & automation

    @Emmaf wrote: Q: Hi @MisterShak you recently presented at California Technology Summit. What did you talk about? A: I talked about how bringing in Open Source tools and Automation can drastically change the effectiveness of a SOC. Q: Was this your first time presenting at […]

  • Lojack Double Agent

    @seag33k wrote: They said that due to Lojack software being trusted by most AV solutions, these tainted version are being missed. Their suggestion is to use Yara to scan Lojack agents. I haven’t used Yara before, but wondered if comparing the hash value of the […]

  • Thug, a Python low-interaction honeyclient--do you use this tool?

    @Emmaf wrote: http://thug-honeyclient.readthedocs.io/en/latest/intro.html Do you use this tool^? What do you use it for? Posts: 1 Participants: 1 Read full topic […]

  • BSides Charm 2018 Security Conference Videos

    @J_Geno wrote: Link to Videos:YouTube Adrian Crenshaw What What? Conference Talks: Track 1 13 Closing Ceremonies Track 2 09 Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell Track 1 12 Adding Simulated Users to Your […]

Contact Us