SIEM OKUMA LİSTESİ
SIEM NASIL SEÇİLİR?
Korelasyon ve Canlı Logu Göz Ardı Ederseniz Elinizde Değil SIEM Log Yönetimi Bile Kalmaz!
https://drertugrulakbas.medium.com/korelasyon-ve-canl%C4%B1-logu-g%C3%B6z-ard%C4%B1-ederseniz-elinizde-de%C4%9Fil-siem-log-y%C3%B6netimi-bile-kalmaz-5a3295c5b54
İyi Bir SIEM Neden Gerekli? Herhangi Bir SIEM Olsa Olmaz Mı?
https://drertugrulakbas.medium.com/i%CC%87yi-bir-siem-neden-gerekli-herhangi-bir-siem-olsa-olmaz-m%C4%B1-7674d5921d71
SIEM Çözümlerinden Maksimum Fayda Nasıl Elde Edilir?
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinden-maksimum-fayda-nas%C4%B1l-elde-edilir-ad3c7089524f
Ben SIEM’e güçlü SIEM demem SIEM KORELASYON yapmadıkça!
https://drertugrulakbas.medium.com/ben-sieme-g%C3%BC%C3%A7l%C3%BC-siem-demem-siem-korelasyon-yapmad%C4%B1k%C3%A7a-85068370f85f
Güçlü bir SIEM nasıl seçilir?
https://drertugrulakbas.medium.com/g%C3%BC%C3%A7l%C3%BC-bir-siem-nas%C4%B1l-se%C3%A7ilir-257e6d404f77
SIEM Projesi Yaparken Sorulması Gereken Sorular
https://drertugrulakbas.medium.com/siem-projesi-yaparken-sorulmas%C4%B1-gereken-sorular-670559ed3ba9
SureLog SIEM Korelasyon Yeteneğinin Rakiplere Göre Fark, Avantaj ve Üstünlükleri Nelerdir?
https://drertugrulakbas.medium.com/surelog-siem-korelasyon-yetene%C4%9Finin-rakiplere-g%C3%B6re-fark-avantaj-ve-%C3%BCst%C3%BCnl%C3%BCkleri-nelerdir-e22b1c97d9f9
Başarısız SIEM Proje Sebepleri ve SIEM Nasıl Seçilir?
https://drertugrulakbas.medium.com/ba%C5%9Far%C4%B1s%C4%B1z-siem-proje-sebepleri-ve-siem-nas%C4%B1l-se%C3%A7ilir-5a8a9bda6f3e
SIEM Balonları
https://drertugrulakbas.medium.com/siem-balonlar%C4%B1-3a1fbfbd512e
SIEM Ürünlerinin Korelasyon Yetenekleri Nasıl Test Edilir?
https://drertugrulakbas.medium.com/ger%C3%A7ek-siem-korelasyon-motorunun-faydalar%C4%B1-2879bd510de2
SIEM Özellikleri
https://drertugrulakbas.medium.com/siem-%C3%B6zellikleri-215937c38d86
SIEM Nedir?
https://drertugrulakbas.medium.com/siem-nedir-59e07c04b649
Doğru SIEM Nasıl Seçilir?
https://drertugrulakbas.medium.com/do%C4%9Fru-siem-nas%C4%B1l-se%C3%A7ilir-dc09613ce395
Türkiye’de Yapılan Başarısız SIEM Proje Örnekleri
https://drertugrulakbas.medium.com/t%C3%BCrkiyede-yap%C4%B1lan-ba%C5%9Far%C4%B1s%C4%B1z-siem-proje-%C3%B6rnekleri-4a9065d0d57
Türkiye’de Yapılan Her On SIEM Projesinden Yedisinde Olan Problemler Nelerdir?
https://drertugrulakbas.medium.com/t%C3%BCrkiyede-yap%C4%B1lan-her-on-siem-projesinden-yedisinde-olan-problemler-nelerdir-d8dc63e2eb5f
The Importance Of SIEM List/Watchlist Management and Product Comparisons
https://drertugrulakbas.medium.com/the-importance-of-siem-list-watchlist-management-and-product-comparisons-3f7cc3395d3f
SIEM Correlation Rules To Evaluate The Power Of Detection — Correlation Engine
https://drertugrulakbas.medium.com/siem-correlation-rules-to-evaluate-the-power-of-detection-correlation-engine-24ae3d1cfe05
The Math of SIEM Comparison
https://drertugrulakbas.medium.com/the-math-of-siem-comparison-91fad2ff7cac
Comparing Detection Capabilities of SIEM Solutions with Their Costs
https://drertugrulakbas.medium.com/comparing-detection-capabilities-of-siem-solutions-with-their-costs-171e98de09a7
Comparison of Detection Methodologies in SIEM. Correlation and Search
https://drertugrulakbas.medium.com/comparison-of-detection-methodologies-in-siem-correlation-and-search-e6840bb3a0f8
What Really Matters When Selecting a SIEM and How to Choose a SIEM Looking into the Correlation?
https://drertugrulakbas.medium.com/what-really-matters-when-selecting-a-siem-and-how-to-choose-a-siem-looking-into-the-correlation-bdbf7d0d5ee6
Patlamış bir SIEM ürünü ve/veya Projesi Kurtarılabilir mi? Nasıl?
https://drertugrulakbas.medium.com/patlam%C4%B1%C5%9F-bir-siem-%C3%BCr%C3%BCn%C3%BC-ve-veya-projesi-kurtar%C4%B1labilir-mi-nas%C4%B1l-b555c63a9879
Why SureLog is the Right SIEM Solution?
https://drertugrulakbas.medium.com/why-surelog-is-the-right-siem-solution-6bad5a6f88e3
How to Select the Right SIEM Solution?
https://drertugrulakbas.medium.com/how-to-select-the-right-siem-solution-4516f7d124b6
Çok Temel SIEM Proje Yanlışları Nelerdir?
https://drertugrulakbas.medium.com/%C3%A7ok-temel-siem-proje-yanl%C4%B1%C5%9Flar%C4%B1-nelerdir-6018e9fadaa
Bir SIEM Seçerken Kötü Bir Tercih Yapmaktan Nasıl Kaçınırız?
https://drertugrulakbas.medium.com/bir-siem-se%C3%A7erken-k%C3%B6t%C3%BC-bir-tercih-yapmaktan-nas%C4%B1l-ka%C3%A7%C4%B1n%C4%B1r%C4%B1z-bb1148feb47b
SIEM Çözümlerini Değerlendirirken Bakılacak En Önemli Parametre Korelasyon Yeteneğidir
https://drertugrulakbas.medium.com/siem-3ed84d90d0fb
SIEM Seçme Süreçlerindeki Aksaklıklar ve Son Kullanıcının Durumu
https://drertugrulakbas.medium.com/siem-se%C3%A7me-s%C3%BCre%C3%A7lerindeki-aksakl%C4%B1klar-ve-son-kullan%C4%B1c%C4%B1n%C4%B1n-durumu-42ce5d045623
SURELOG YAPAY ZEKA ÖZELLİKLERİ
Anomaly Detection with SureLog SIEM UEBA Module Using RPCA
https://www.surelogsiem.com/2021/04/01/anomaly-detection-with-surelog-siem-ueba-module-using-rpca/
Anomaly Detection with SureLog SIEM UEBA Module Using Markov Chain
https://www.surelogsiem.com/2021/03/01/anomaly-detection-with-surelog-siem-ueba-module-using-markov-chain/
SIEM Çözümlerinde Korelasyon ve Yapay Zeka
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-korelasyon-ve-yapay-zeka-4ca547d76377
SURELOG SIEM AND ADVANCED THREAT ANALYTICS WITH MACHINE LEARNING (ML)
https://www.surelogsiem.com/2019/06/21/surelog-siem-and-advanced-threat-analytics-with-machine-learning-ml/
SureLog SIEM Federated Anomaly Detection Engine Using Classification
https://www.surelogsiem.com/2019/07/19/surelog-siem-federated-anomaly-detection-engine-using-classification/
User and Entity Profiling with SureLog
https://www.surelogsiem.com/2019/08/19/user-and-entity-profiling-with-surelog/
SIEM, SOC ve BULUT
SOC, Bulutta SIEM veya Yönetilen SIEM Hizmetlerinde Madalyonun Öteki Yüzü
https://drertugrulakbas.medium.com/soc-bulutta-siem-veya-y%C3%B6netilen-siem-hizmetlerinde-madalyonun-%C3%B6teki-y%C3%BCz%C3%BC-98dae87154fd
Bulut ve Loglar
https://drertugrulakbas.medium.com/bulut-ve-loglar-b267a8bbf814
SOC Hizmeti Seçilirken Göz Ardı Edilen Arşiv Loglarının Akibeti
https://drertugrulakbas.medium.com/soc-hizmeti-se%C3%A7ilirken-g%C3%B6z-ard%C4%B1-edilen-ar%C5%9Fiv-loglar%C4%B1n%C4%B1n-akibeti-4865f2c72f7d
Can Organizations Meet Compliance Regulations with Cloud-Based SIEM Solutions?
https://drertugrulakbas.medium.com/can-organizations-meet-compliance-regulations-with-cloud-based-siem-solutions-c2897fbeb48f
SOC Önceliği Ne Olmalı?
https://drertugrulakbas.medium.com/soc-%C3%B6nceli%C4%9Fi-ne-olmal%C4%B1-7e139cd6dc9c
SIEM ve SOC PoC İpuçları -1
https://drertugrulakbas.medium.com/siem-ve-soc-poc-i%CC%87pu%C3%A7lar%C4%B1-1-3b833edb0266
SIEM DİSK KULLANIMI: CANLI ve ARŞİV LOGLAR
SIEM Çözümlerinin Az Log Miktarındaki Arama Performansına(Örnek 14 Milyon) Bakarak Çok Log Miktarındaki Arama Performansı(Örnek 79 Milyar) Nasıl Ölçülür?
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-canl%C4%B1-logdan-aramak-30-40-kat-daha-h%C4%B1zl%C4%B1d%C4%B1r-82a77e23134f
SIEM Çözümlerinde Canlı Logdan Aramak 30–40 Kat Daha Hızlıdır
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinin-az-log-miktar%C4%B1ndaki-arama-%C3%B6rnek-14-milyon-bakarak-%C3%A7ok-log-miktar%C4%B1ndaki-arama-8329ae896e10
SolarWinds’in Hacklenmesi Vakasında Olduğu Gibi APT Grupları Tarafından Gerçekleştirilen Saldırılar ve Bu Saldırıların Analizinde SIEM’in Yeri
https://drertugrulakbas.medium.com/solarwindsin-hacklenmesi-vakas%C4%B1nda-oldu%C4%9Fu-gibi-apt-gruplar%C4%B1-taraf%C4%B1ndan-ger%C3%A7ekle%C5%9Ftirilen-sald%C4%B1r%C4%B1lar-79e288d8fd68
SIEM’lerde Sıcak Veri (Canlı Log)
https://drertugrulakbas.medium.com/siemlerde-s%C4%B1cak-veri-canl%C4%B1-log-6843666dde6d
What is Hot Data and What is Archive Data in SIEM Solutions?
https://drertugrulakbas.medium.com/what-is-hot-data-and-what-is-archive-data-in-siem-solutions-145241480e67
SIEM ÇÖZÜMLERİNDE CANLI LOG NEDEN KRİTİKTİR?
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmleri%CC%87nde-canli-log-neden-kri%CC%87ti%CC%87kti%CC%87r-18eff7c4b613
SURELOG SIEM ARŞİV VE ARŞİVDEN GERİ DÖNME ÖZELLİĞİ
Canlı Log Neden Kritik? Arşiv Neden Yetersiz?
https://drertugrulakbas.medium.com/canl%C4%B1-log-neden-kritik-ar%C5%9Fiv-neden-yetersiz-4527d01fd623
SIEM Çözümlerinde Logların Canlıda Tutulması ile Arşivde Tutulmasının Farkı
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-loglar%C4%B1n-canl%C4%B1da-tutulmas%C4%B1-ile-ar%C5%9Fivde-tutulmas%C4%B1n%C4%B1n-fark%C4%B1-fe221ee8613b
SIEM ve Logları Çok Uzun Süre Canlıda Tutmanın Kritikliği — Sahadan Tecrübeler
https://drertugrulakbas.medium.com/siem-ve-loglar%C4%B1-%C3%A7ok-uzun-s%C3%BCre-canl%C4%B1da-tutman%C4%B1n-kritikli%C4%9Fi-sahadan-tecr%C3%BCbeler-e92c06588c77
Logların Arşivden Dönülmesi mi?
https://drertugrulakbas.medium.com/loglar%C4%B1n-ar%C5%9Fivden-d%C3%B6n%C3%BClmesi-mi-a82182741efd
SIEM Ürünlerinde Arşiv Log Kapasitesini Canlı Log Olarak Algılamak
https://drertugrulakbas.medium.com/siem-%C3%BCr%C3%BCnlerinde-ar%C5%9Fiv-log-kapasitesini-canl%C4%B1-log-olarak-alg%C4%B1lamak-9033c84a311c
SIEM İçin Canlıda Log Tutma ve Gerçek Zamanlı Aramanın Önemi
https://drertugrulakbas.medium.com/siem-i%CC%87%C3%A7in-canl%C4%B1da-log-tutma-ve-araman%C4%B1n-%C3%B6nemi-3d3142f73f60
SureLog Disk Kullanım Avantajları
https://medium.com/@eakbas/surelog-disk-kullan%C4%B1m-avantajlar%C4%B1-5111335b8416
YERLİ ve MİLLİ SIEM
SİBERKAFE Online Siber Güvenlik Sohbetleri — 21 / Yerli SIEM Ürünleri Sohbetine SureLog Olsa İdi İle Katkılarım
https://drertugrulakbas.medium.com/si%CC%87berkafe-online-siber-g%C3%BCvenlik-sohbetleri-21-yerli-siem-%C3%BCr%C3%BCnleri-sohbetine-surelog-olsa-i%CC%87di-ac234010f0fd
2015 Yılından SIEM ve Yerli/Milli ile İlgili Öngörüm
https://drertugrulakbas.medium.com/2015-y%C4%B1l%C4%B1ndan-siem-ve-yerli-milli-ile-i%CC%87lgili-%C3%B6ng%C3%B6r%C3%BCm-4fff7a5d5e16
SIEM EPS DEĞERLERİ VE SURELOG
SIEM Çözümlerinde EPS Limitleri Ne İşe Yarar? Veya Neyi Berbat Eder?Günlük Log Miktarı Ölçümü Farklı Mıdır?
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-eps-limitleri-ne-i%CC%87%C5%9Fe-yarar-ae6c624a86be
SIEM VE SURELOG
Gerçek SIEM Korelasyon Motorunun Faydaları
https://drertugrulakbas.medium.com/ger%C3%A7ek-siem-korelasyon-motorunun-faydalar%C4%B1-2879bd510de2
“At The Same Time” SIEM Operator
https://drertugrulakbas.medium.com/at-the-same-time-siem-operator-be8d6598b7b8
SIEM Çözümlerinde Operatörler
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-operat%C3%B6rler-181d13d8685a
SIEM Korelasyon Nedir? Neden Altın Değerindedir?
https://drertugrulakbas.medium.com/siem-korelasyon-nedir-neden-alt%C4%B1n-de%C4%9Ferindedir-8a1abdcaa9b2
SIEM ve Alarmları Korelasyon Sanmak
https://drertugrulakbas.medium.com/siem-ve-alarmlar%C4%B1-korelasyon-sanmak-13b20990dc32
Do We Need a Buzzword to Re-understand the Value of the SIEM Correlation?
https://drertugrulakbas.medium.com/do-we-need-a-buzzword-to-re-understand-the-value-of-the-siem-correlation-29315a6e713d
Is SIEM Correlation or Rules are Useless?
https://drertugrulakbas.medium.com/is-siem-correlation-or-rules-are-useless-d74c0b001e32
Önemsenmeyen veya Gözden Kaçan SIEM Korelasyon Motoru Özelliği -Gerçek Zamanlı Korelasyon-
https://drertugrulakbas.medium.com/%C3%B6nemsenmeyen-veya-g%C3%B6zden-ka%C3%A7an-siem-korelasyon-motoru-%C3%B6zelli%C4%9Fi-ger%C3%A7ek-zamanl%C4%B1-korelasyon-57d3f204352f
SIEM for SMB in 2020
https://drertugrulakbas.medium.com/siem-for-smb-in-2020-a04e3fe8e98d
En İyi SIEM Hangisi
https://drertugrulakbas.medium.com/en-i%CC%87yi-siem-hangisi-58da55aef21
SIEM Ürünlerinin Korelasyon Farkları
https://drertugrulakbas.medium.com/siem-%C3%BCr%C3%BCnlerinin-korelasyon-farklar%C4%B1-cec00847b8cb
SureLog SIEM Taxonomy ile Dikkatimizden Kaçan Olayları Yakalamak
https://drertugrulakbas.medium.com/surelog-siem-taxonomy-ile-dikkatimizden-ka%C3%A7an-olaylar%C4%B1-yakalamak-1a7716ff8d92
SureLog SIEM Korelasyon Kuralı Geliştirme Örnek Çalışması-1
https://drertugrulakbas.medium.com/surelog-siem-korelasyon-kural%C4%B1-geli%C5%9Ftirme-%C3%B6rnek-%C3%A7al%C4%B1%C5%9Fmas%C4%B1-1-2f0e8f03a00
GDPR Compliance: Simplify The Task with SureLog SIEM
https://drertugrulakbas.medium.com/gdpr-compliance-simplify-the-task-with-surelog-siem-27369482c956
Indicator of Attacks Detected with SureLog SIEM
https://drertugrulakbas.medium.com/indicator-of-attacks-detected-with-surelog-siem-152bc77f2c25
Behavior Models With SureLog
https://drertugrulakbas.medium.com/behavior-models-with-surelog-31f1a8a5d776
3 Best SureLog SIEM Features
https://drertugrulakbas.medium.com/3-best-surelog-siem-features-415130f74ebf
SureLog Predefined Reports Sample:Detect Password Changes and Password Resets With SureLog SIEM
https://drertugrulakbas.medium.com/surelog-predefined-reports-sample-detect-password-changes-and-password-resets-with-surelog-siem-1807d97f9a25
Not All SIEM Solutions Are Equal and Not All SIEM Use Cases Are the Same
https://drertugrulakbas.medium.com/not-all-siem-solutions-are-equal-and-not-all-siem-use-cases-are-the-same-cea9be0df6bb
ML/AI Is A Feature, Not A Silver Bullet And UEBA Questions
https://drertugrulakbas.medium.com/ml-ai-is-a-feature-not-a-silver-bullet-and-ueba-questions-d504a6926c4e
Don’t dismiss event correlation
https://drertugrulakbas.medium.com/dont-dismiss-event-correlation-6aa155565bbf
Never Seen Before Type of SIEM Rules
https://drertugrulakbas.medium.com/never-seen-before-type-of-siem-rules-6d31b2f622c2
SIEM Use Cases
https://drertugrulakbas.medium.com/best-siem-use-cases-95e53cffa7b3
GDPR SIEM Requirements
https://drertugrulakbas.medium.com/gdpr-siem-requirements-78330682b1d7
Siber Tehditleri Nasıl Tespit Edelim?
https://drertugrulakbas.medium.com/siber-tehditleri-nas%C4%B1l-tespit-edelim-51339d9c8d2c
Which Generation of SIEM?
https://drertugrulakbas.medium.com/which-generation-of-siem-b36dcd6a5cb6
Taxonomy Makes Raw Data Human Understandable
https://drertugrulakbas.medium.com/taxonomy-makes-raw-data-human-understandable-fbf92370139d
SIEM Sample Use Cases — Rules & Models
https://drertugrulakbas.medium.com/siem-sample-use-cases-rules-models-50407f0fb8c
SIEM Sistemlerinin Gereksinimlerini Hangi Parametreler Belirler?
https://drertugrulakbas.medium.com/siem-sistemlerinin-gereksinimlerini-hangi-parametreler-belirler-6b47a87cf741
ANATOMY OF SIEM USE CASES
https://drertugrulakbas.medium.com/anatomy-of-siem-use-cases-f7b8f3d56852
Neden SureLog SIEM?
https://drertugrulakbas.medium.com/neden-surelog-siem-8736321ab069
Neden Her SIEM Aynı SIEM Değildir?
https://medium.com/@eakbas/neden-her-siem-ayni-siem-degil-1022268b7527
Malware Fighting with SureLog SIEM
https://www.surelogsiem.com/2019/07/23/malware-fighting-with-surelog-siem
HOW TO SPOT AND STOP MALWARE?
https://medium.com/@eakbas/how-to-spot-and-stop-malware-9e5e8fc48242
SURELOG SIEM PROFILER
https://medium.com/@eakbas/surelog-siem-profiler-181dd9841c9f
Anatomy of an Intrusion Detection Using SureLog SIEM
https://medium.com/@eakbas/anatomy-of-a-intrusion-detection-using-surelog-siem-b8efa48087bf
Rule As a Code — SureLog Correlation Engine and Beyond
https://medium.com/which-generation-of-siem/rule-as-a-code-surelog-correlation-engine-and-beyond-90dc6ab9a52c
SIEM Taxonomy Makes Raw Data Human Understandable
https://medium.com/@eakbas/siem-taxonomy-makes-raw-data-human-understandable-eb8cdfb033a4
GDPR Access Monitoring Rules With SureLog SIEM -1
https://medium.com/@eakbas/gdpr-access-monitoring-rules-with-surelog-siem-1-c421bde8bb67
The True Power of SureLog Taxonomy
https://medium.com/@eakbas/the-true-power-of-surelog-taxonomy-c6a2cc2636e1
The Fastest Way to See What is Going on Your Network’s Security Aspect is SureLog SIEM
https://medium.com/@eakbas/the-fastest-way-to-see-what-is-going-on-your-networks-security-aspect-is-surelog-siem-f8dfa7700112
How to Search Billions of Logs Without learning New Script Language With SureLog SIEM?
https://medium.com/@eakbas/how-to-search-billions-of-logs-without-learning-new-script-language-with-surelog-siem-2e33aa38a4dd
A Quick Guide to Help You Understand and Create User Behavior Rules With SureLog SIEM -2
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rules-with-surelog-siem-2-dc31c6f62721
Never Seen Before Type of Rules With SureLog SIEM
https://medium.com/@eakbas/never-seen-before-type-of-rules-with-surelog-siem-cb3c0a7dc0c3
How is SureLog Different from Other SIEM Products?
https://medium.com/@eakbas/how-is-surelog-different-from-other-siem-products-40c41413c12f
SureLog SIEM User Behavior Monitoring Rules -New Account Use Detected
https://medium.com/@eakbas/surelog-ueba-941bed43f9ad
SureLog SIEM User Behavior Rule: “Detects when a user account is created and deleted in a short period of time.”
https://medium.com/@eakbas/surelog-ueba-3cbf478d319d
SIEM ile Saldırı Tespitinin Anatomisi
https://medium.com/@eakbas/siem-ile-saldırı-tespitinin-anatomisi-b44f3a8f4f0d
SureLog SIEM User Behavior Rule: “Detects when a user account is created and deleted in a short period of time.”
https://medium.com/@eakbas/surelog-siem-user-behaviour-rule-detects-when-a-user-account-is-created-and-deleted-in-a-short-a8420d6bae0
Database Audit And Correlation With SureLog SIEM
https://medium.com/@eakbas/database-audit-and-correlation-with-surelog-siem-e1e6a495f823
A Quick Guide to Help You Understand and Create User Behavior Rule With SureLog SIEM -1
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rule-with-surelog-siem-1-e59776dba80f
SureLog SIEM User Behavior Monitoring Rules — List
https://medium.com/@eakbas/surelog-siem-user-behaviour-monitoring-rules-18bcc94d334d
Look at How You Monitor Access Permissions with SureLog SIEM for GDPR
https://medium.com/@eakbas/look-at-how-you-montor-access-permissions-with-surelog-siem-f54af65cc63f
KRİTİK WINDOWS OLAY KAYITLARININ DETAYLI ANALİZİ VE AVUSTRALYA SİBER GÜVENLİK MERKEZİ TAVSİYELERİNİN SURELOG SIEM İLE UYGULANMASI
https://medium.com/@eakbas/kri̇ti̇k-windows-olay-kayitlarinin-detayli-anali̇zi̇-ve-avustralya-si̇ber-güvenli̇k-merkezi̇-2c2a4d204e25
Implementing Windows Advanced Logging Cheat Sheet with SureLog SIEM
https://medium.com/@eakbas/implementing-windows-advanced-logging-cheat-sheet-with-surelog-siem-45f7b3dcd4b
Creating New Dashboards With SureLog SIEM
https://medium.com/@eakbas/creating-new-dashboards-with-surelog-siem-a67232c84366
Why is taxonomy important? And Extensive SureLog SIEM Taxonomy Features
https://medium.com/@eakbas/why-is-taxonomy-important-and-extensive-surelog-siem-taxonomy-features-824ed40d89b3
Surelog Intelligence
https://www.slideshare.net/anetertugrul/surelog-intelligence
SEIM ve Taxonomy
https://www.linkedin.com/pulse/seim-ve-taxonomy-ertugrul-akbas
Intelligence in SureLog SIEM
https://www.linkedin.com/pulse/intelligence-surelog-siem-ertugrul-akbas
Enhancing SIEM Correlation Rules Through Baselining
https://www.researchgate.net/publication/314186993_Enhancing_SIEM_Correlation_Rules_Through_Baselining
SIEM ÇÖZÜMLERİNDE TAXONOMY NE İŞE YARAR?
https://www.slideshare.net/anetertugrul/siem-cozumlernde-taxonomy-ne-ise-yarar
Context Driven Scalable SIEM Solution
https://www.slideshare.net/anetertugrul/sure-log-context-sensitive-scalable-siem-solution
SINIFLANDIRMA TEMELLİ KORELASYON YAKLAŞIMI
https://www.slideshare.net/anetertugrul/siniflandirma-temell-korelasyon-yaklaimi
SURELOG TEHDIT ISTIHBARATI
https://www.slideshare.net/anetertugrul/surelog-tehdit-istihbarati
Log Yönetimi SIEM Demek Değildir!
https://www.slideshare.net/anetertugrul/log-ynetimi-siem-demek-deildir
KVKK ve SIEM
KVKK ya Nasıl Uyumlu Hale Gelebiliriz?
https://drertugrulakbas.medium.com/kvkk-ya-nas%C4%B1l-uyumlu-hale-gelebiliriz-e05ae8ac7b86
KVKK Nedir? Ne Değildir?
https://drertugrulakbas.medium.com/kvkk-nedir-ne-de%C4%9Fildir-395d615531f1
Kişisel Verileri Koruma Kanununa Uyum Çalışmalarının Karanlık Yönleri
https://drertugrulakbas.medium.com/ki%C5%9Fisel-verileri-koruma-kanununa-uyum-%C3%A7al%C4%B1%C5%9Fmalar%C4%B1n%C4%B1n-karanl%C4%B1k-y%C3%B6nleri-18c45bdb0d6c
KVKK İdari Tedbirler mi? Yoksa Teknik Tedbirler mi?
https://drertugrulakbas.medium.com/kvkk-i%CC%87dari-tedbirler-mi-yoksa-teknik-tedbirler-mi-98779d987551
KVKK İhlal bildirimleri ve Her SIEM Aynı SIEM Midir?
https://drertugrulakbas.medium.com/kvkk-siem-a739fab47e71
KVKK Veri İhlali Bildirimlerden Anladıklarım
https://medium.com/@eakbas/kvkk-veri-i%CC%87hlali-bildirimlerden-anlad%C4%B1klar%C4%B1m-67613ea094f4
KVKK Teknik Tedbirler
https://medium.com/@eakbas/kvkk-teknik-tedbirler-e0035db15ef7
Kişisel Verilerin Korunması Kanununa (KVKK) Nasıl Uyumlu Hale Geliriz?
https://medium.com/@eakbas/ki%C5%9Fisel-verilerin-korunmas%C4%B1-kanununa-kvkk-nas%C4%B1l-uyumlu-hale-geliriz-9d6db303b89f
KVKK Teknik Tedbirlerden Log Kayıtları MaddesiKVKK Teknik Tedbirlerden Log Kayıtları Maddesi
https://medium.com/@eakbas/kvkk-teknik-tedbirlerden-log-kay%C4%B1tlar%C4%B1-maddesi-bfa3e7c17231
SureLog, QRadar, ArcSight, Splunk, McAfee, LogSign, CRYPTOSIM, AlienVault SIEM Çözümlerinde KVKK, ISO27001, PCI ve Benzeri Süreçler Açısından Geçmişe Dönük Logların Yönetimi ve Disk İhtiyacı
https://medium.com/@eakbas/surelog-qradar-arcsight-splunk-mcafee-logsign-cryptosim-alienvault-siem-389bd822b602
KVKK SIEM Senaryo ve Kuralları
https://medium.com/@eakbas/kvkk-siem-senaryo-ve-kurallar%C4%B1-5fd8f3fe8077
KVKK ve SIEM
https://medium.com/@eakbas/kvkk-ve-siem-a34438bbc3b0
KVKK KAPSAMINDA Office 365 ve Gmail Kullanımı
https://medium.com/@eakbas/kvkk-kapsaminda-office-365-ve-gmail-kullanımı-6260ca99c292
KVKK Teknik Tedbirleri, Veri Keşfi, Silme ve Anonimleştirme
https://medium.com/@eakbas/kvkk-teknik-tedbirleri-ve-veri-keşfi-silme-ve-anonimleştirme-e9ee66f0a0fb
KVKK Teknik Tedbirleri
https://medium.com/@eakbas/kvkk-teknik-tedbirleri-30209dea746b
Kişisel Verilerin Korunması Kanununa (KVKK) Nasıl Uyumlu Hale Geliriz?
https://medium.com/@eakbas/kişisel-verilerin-korunması-kanununa-kvkk-nasıl-uyumlu-hale-geliriz-9d6db303b89f
KVKK ile İlgili Güvenlik Önerileri
https://medium.com/@eakbas/kvkk-ile-i̇lgili-güvenlik-önerileri-2990680a89a6
Kişisel Verilerin Korunması Kanununa (KVKK) Güvenlik Bakış Açısı İle Bakmak
https://medium.com/@eakbas/kişisel-verilerin-korunması-kanununa-kvkk-güvenlik-bakış-açısı-i̇le-bakmak-ab5a951d22f0
KVKK Projelerinde Göz Ardı Edilmesi Durumunda Ceza İle Karşılaşılabilecek Durumlar
https://medium.com/@eakbas/kvkk-projelerinde-göz-ardı-edilmesi-durumunda-ceza-i̇le-karşılaşılabilecek-durumlar-3dcc9f9846e
KVKK Kapsamında Veri Envanteri ve Veri Envanterinin Yetki Matrisi ve Yetki Kontrolü Açısından Önemi
https://medium.com/@eakbas/kvkk-kapsamında-veri-envanteri-ve-veri-envanterinin-yetki-matrisi-ve-yetki-kontrolü-açısından-81e6a8e52a56
KVKK İçin SIEM Ne Demek?
https://medium.com/@eakbas/kvkk-i̇çin-siem-ne-demek-ab0a514b449b
SIEM ve Veri Arama Motoru
https://www.linkedin.com/pulse/siem-ve-veri-arama-motoru-ertugrul-akbas
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
https://medium.com/@eakbas/siem-ve-kvkk-teknik-tedbirlerinin-anet-surelog-siem-ile-uygulanması-e5dfd7dca7dc
KVKK ile SIEM İlişkisi Sadece Log Tutmak mı?
https://medium.com/@eakbas/kvkk-ile-siem-i̇lişkisi-sadece-log-tutmak-mı-97cef9233fa4
KVKK ve Siperium Veri Bulma (Data Discovery) ve Sınıflandırma (Data Classification)
https://medium.com/@eakbas/kvkk-ve-siperium-veri-bulma-data-discovery-8445bcf7d563
KVKK UYUMU BU KADAR ZOR VE PAHALI OLMASA GEREK!
https://www.linkedin.com/pulse/kvkk-uyumu-bu-kadar-zor-ve-pahali-olmasa-gerek-ertugrul-akbas/
SIEM ve SOC Hizmeti Seçerken Gözden Kaçanlar
https://medium.com/@eakbas/siem-soc-8101a4bb0d23
SURELOG SIEM KORELASYON KURALLARI
KVKK SIEM Senaryo ve Kuralları -2-
https://drertugrulakbas.medium.com/surelog-siem-only-unique-use-cases-bb0c2b20e5b5
SureLog SIEM Only Unique Use Cases
https://drertugrulakbas.medium.com/surelog-siem-only-unique-use-cases-bb0c2b20e5b5
Is There a Value On SIEM Product Without really Powerful Correlation Capability?
https://drertugrulakbas.medium.com/is-there-a-value-on-siem-product-without-really-powerful-correlation-capability-8377c9b48582
SIEM Senaryolarını Test Etmek veya Etmemek!
https://drertugrulakbas.medium.com/siem-senaryolar%C4%B1n%C4%B1-test-etmek-veya-etmemek-4510484b5602
SIEM PoC Çalışmaları İçin Hap Senaryo Örnekleri
https://drertugrulakbas.medium.com/siem-poc-%C3%A7al%C4%B1%C5%9Fmalar%C4%B1-i%CC%87%C3%A7in-hap-senaryo-%C3%B6rnekleri-696e1569e689
Detecting Unusual Activities Using a Next Generation SIEM -Use Cases Part 2
https://drertugrulakbas.medium.com/detecting-unusual-activities-using-a-next-generation-siem-use-cases-part-2-27b201bcc127
Detecting Unusual Activities Using a Next Generation SIEM: Use Cases
https://drertugrulakbas.medium.com/detecting-unusual-activities-using-a-next-generation-siem-use-cases-d91f4e24b0f2
SIEM Use Case -Korelasyon Yeteneği Analizi Örnek Çalışması -1
https://drertugrulakbas.medium.com/siem-use-case-1-be12b9eb9d46
What is a SIEM Use Case? How to Compare SIEM Use Cases? Breaking Down the SIEM Use Cases
https://drertugrulakbas.medium.com/what-is-a-siem-use-case-how-to-compare-siem-use-cases-breaking-down-the-siem-use-cases-d73688fe28e2
SIEM Use Case -IBM Qradar İle Korelasyon Analizi Örnek Çalışması-
https://drertugrulakbas.medium.com/siem-use-case-ibm-qradar-i%CC%87le-korelasyon-yetene%C4%9Fi-analizi-%C3%B6rnek-%C3%A7al%C4%B1%C5%9Fmas%C4%B1-63694e4eeb57
Surelog SIEM ile Saldırı Tespitinin Anatomisi
https://medium.com/@eakbas/siem-ile-sald%C4%B1r%C4%B1-tespitinin-anatomisi-b44f3a8f4f0d
SureLog SIEM Sample Use Cases -Rules&Models
https://medium.com/@eakbas/surelog-siem-sample-use-cases-rules-models-c50a945ca5b3
SureLog SIEM User Behavior Monitoring Rules — List
https://medium.com/@eakbas/surelog-siem-user-behaviour-monitoring-rules-18bcc94d334d
GDPR Access Monitoring Rules With SureLog SIEM -1
https://medium.com/@eakbas/gdpr-access-monitoring-rules-with-surelog-siem-1-c421bde8bb67
A Quick Guide to Help You Understand and Create User Behavior Rule With SureLog SIEM -1
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rule-with-surelog-siem-1-e59776dba80f
SureLog SIEM User Behavior Rule: “Detects when a user account is created and deleted in a short period of time.”
https://medium.com/@eakbas/surelog-siem-user-behaviour-rule-detects-when-a-user-account-is-created-and-deleted-in-a-short-a8420d6bae0
SureLog SIEM User Behavior Monitoring Rules -New Account Use Detected
https://medium.com/@eakbas/surelog-ueba-941bed43f9ad
A Quick Guide to Help You Understand and Create User Behavior Rules With SureLog SIEM -2
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rules-with-surelog-siem-2-dc31c6f62721
SureLog Rule Model For A User VPNs To the Network from A New Location for The First Time Then Accesses A Shared File System
https://medium.com/@eakbas/surelog-rule-model-for-a-user-vpns-to-the-network-from-a-new-location-for-the-first-time-then-933258c6c702
SureLog SIEM Threat Detection Use Case Samples
https://medium.com/@eakbas/surelog-siem-threat-detection-use-case-samples-a974eb9c2f34
Detecting Personally Identifiable Information (PII) Breaches With SureLog SIEM
https://medium.com/@eakbas/detecting-personally-identifiable-information-pii-breaches-with-surelog-siem-da5cffba0771
A Quick Guide to Help You Understand and Create User Behavior Rules With SureLog SIEM-4
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rules-with-surelog-siem-4-96a1d158c422
KVKK SIEM Senaryo ve Kuralları
https://medium.com/@eakbas/kvkk-siem-senaryo-ve-kurallar%C4%B1-5fd8f3fe8077