Powering Security Operations with context-aware detections, alert prioritization and risk scoring in Google Chronicle.

  • Prioritize threats with risk scoring: Making relevant context available for heuristic-driven contextual risk scoring of detections at detection execution time rather than at the human triage stage.
  • Respond to alerts faster: Reducing time spent on triage and manually stitching together information from disparate IT security systems (e.g. EDR consoles, firewall/proxy logs, CMDB and IAM context, and vulnerability scan results).
  • Enhance fidelity of alerting: Enabling analysts and detection engineers to filter out entire clusters of threats that may be expected or represent little-to-no danger to the enterprise (e.g. malware testing in a sandbox environment, vulnerabilities and anomalous activity in a development network with no sensitive data or access, and more).

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Announcement that LBank has completed the reward distribution of “Deposit INSUR Share USDT”…

4 Ways Web Application Firewall Can Ensure Safety

{UPDATE} PAC-MAN Hack Free Resources Generator

Important Terms in a Licensing Agreement


{UPDATE} Party Charades TV Hack Free Resources Generator

Important Updates on Bitmart Deposits

Why SQLi Will Continue to Be the Most Attempted Injection Attacks from OWASP 10

SQLi attack

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


More from Medium

Security Analyst Diaries #2: Detect-alert-respond, context is key everywhere in security operations.

The Shift-Left strategy applied to Threat Detection

Attack Flow — Beyond Atomic Behaviors

How to write detection rules using Kusto in Microsoft Sentinel (Part 1)