SIEM OKUMA LİSTESİ

Ertugrul Akbas
12 min readDec 20, 2019

--

SIEM NASIL SEÇİLİR?

Korelasyon ve Canlı Logu Göz Ardı Ederseniz Elinizde Değil SIEM Log Yönetimi Bile Kalmaz!
https://drertugrulakbas.medium.com/korelasyon-ve-canl%C4%B1-logu-g%C3%B6z-ard%C4%B1-ederseniz-elinizde-de%C4%9Fil-siem-log-y%C3%B6netimi-bile-kalmaz-5a3295c5b54

İyi Bir SIEM Neden Gerekli? Herhangi Bir SIEM Olsa Olmaz Mı?
https://drertugrulakbas.medium.com/i%CC%87yi-bir-siem-neden-gerekli-herhangi-bir-siem-olsa-olmaz-m%C4%B1-7674d5921d71

SIEM Çözümlerinden Maksimum Fayda Nasıl Elde Edilir?
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinden-maksimum-fayda-nas%C4%B1l-elde-edilir-ad3c7089524f

Ben SIEM’e güçlü SIEM demem SIEM KORELASYON yapmadıkça!
https://drertugrulakbas.medium.com/ben-sieme-g%C3%BC%C3%A7l%C3%BC-siem-demem-siem-korelasyon-yapmad%C4%B1k%C3%A7a-85068370f85f

Güçlü bir SIEM nasıl seçilir?
https://drertugrulakbas.medium.com/g%C3%BC%C3%A7l%C3%BC-bir-siem-nas%C4%B1l-se%C3%A7ilir-257e6d404f77

SIEM Projesi Yaparken Sorulması Gereken Sorular
https://drertugrulakbas.medium.com/siem-projesi-yaparken-sorulmas%C4%B1-gereken-sorular-670559ed3ba9

SureLog SIEM Korelasyon Yeteneğinin Rakiplere Göre Fark, Avantaj ve Üstünlükleri Nelerdir?
https://drertugrulakbas.medium.com/surelog-siem-korelasyon-yetene%C4%9Finin-rakiplere-g%C3%B6re-fark-avantaj-ve-%C3%BCst%C3%BCnl%C3%BCkleri-nelerdir-e22b1c97d9f9

Başarısız SIEM Proje Sebepleri ve SIEM Nasıl Seçilir?
https://drertugrulakbas.medium.com/ba%C5%9Far%C4%B1s%C4%B1z-siem-proje-sebepleri-ve-siem-nas%C4%B1l-se%C3%A7ilir-5a8a9bda6f3e

SIEM Balonları
https://drertugrulakbas.medium.com/siem-balonlar%C4%B1-3a1fbfbd512e

SIEM Ürünlerinin Korelasyon Yetenekleri Nasıl Test Edilir?
https://drertugrulakbas.medium.com/ger%C3%A7ek-siem-korelasyon-motorunun-faydalar%C4%B1-2879bd510de2

SIEM Özellikleri
https://drertugrulakbas.medium.com/siem-%C3%B6zellikleri-215937c38d86

SIEM Nedir?
https://drertugrulakbas.medium.com/siem-nedir-59e07c04b649

Doğru SIEM Nasıl Seçilir?
https://drertugrulakbas.medium.com/do%C4%9Fru-siem-nas%C4%B1l-se%C3%A7ilir-dc09613ce395

Türkiye’de Yapılan Başarısız SIEM Proje Örnekleri
https://drertugrulakbas.medium.com/t%C3%BCrkiyede-yap%C4%B1lan-ba%C5%9Far%C4%B1s%C4%B1z-siem-proje-%C3%B6rnekleri-4a9065d0d57

Türkiye’de Yapılan Her On SIEM Projesinden Yedisinde Olan Problemler Nelerdir?
https://drertugrulakbas.medium.com/t%C3%BCrkiyede-yap%C4%B1lan-her-on-siem-projesinden-yedisinde-olan-problemler-nelerdir-d8dc63e2eb5f

The Importance Of SIEM List/Watchlist Management and Product Comparisons
https://drertugrulakbas.medium.com/the-importance-of-siem-list-watchlist-management-and-product-comparisons-3f7cc3395d3f

SIEM Correlation Rules To Evaluate The Power Of Detection — Correlation Engine
https://drertugrulakbas.medium.com/siem-correlation-rules-to-evaluate-the-power-of-detection-correlation-engine-24ae3d1cfe05

The Math of SIEM Comparison
https://drertugrulakbas.medium.com/the-math-of-siem-comparison-91fad2ff7cac

Comparing Detection Capabilities of SIEM Solutions with Their Costs
https://drertugrulakbas.medium.com/comparing-detection-capabilities-of-siem-solutions-with-their-costs-171e98de09a7

Comparison of Detection Methodologies in SIEM. Correlation and Search
https://drertugrulakbas.medium.com/comparison-of-detection-methodologies-in-siem-correlation-and-search-e6840bb3a0f8

What Really Matters When Selecting a SIEM and How to Choose a SIEM Looking into the Correlation?
https://drertugrulakbas.medium.com/what-really-matters-when-selecting-a-siem-and-how-to-choose-a-siem-looking-into-the-correlation-bdbf7d0d5ee6

Patlamış bir SIEM ürünü ve/veya Projesi Kurtarılabilir mi? Nasıl?
https://drertugrulakbas.medium.com/patlam%C4%B1%C5%9F-bir-siem-%C3%BCr%C3%BCn%C3%BC-ve-veya-projesi-kurtar%C4%B1labilir-mi-nas%C4%B1l-b555c63a9879

Why SureLog is the Right SIEM Solution?
https://drertugrulakbas.medium.com/why-surelog-is-the-right-siem-solution-6bad5a6f88e3

How to Select the Right SIEM Solution?
https://drertugrulakbas.medium.com/how-to-select-the-right-siem-solution-4516f7d124b6

Çok Temel SIEM Proje Yanlışları Nelerdir?
https://drertugrulakbas.medium.com/%C3%A7ok-temel-siem-proje-yanl%C4%B1%C5%9Flar%C4%B1-nelerdir-6018e9fadaa

Bir SIEM Seçerken Kötü Bir Tercih Yapmaktan Nasıl Kaçınırız?
https://drertugrulakbas.medium.com/bir-siem-se%C3%A7erken-k%C3%B6t%C3%BC-bir-tercih-yapmaktan-nas%C4%B1l-ka%C3%A7%C4%B1n%C4%B1r%C4%B1z-bb1148feb47b

SIEM Çözümlerini Değerlendirirken Bakılacak En Önemli Parametre Korelasyon Yeteneğidir
https://drertugrulakbas.medium.com/siem-3ed84d90d0fb

SIEM Seçme Süreçlerindeki Aksaklıklar ve Son Kullanıcının Durumu
https://drertugrulakbas.medium.com/siem-se%C3%A7me-s%C3%BCre%C3%A7lerindeki-aksakl%C4%B1klar-ve-son-kullan%C4%B1c%C4%B1n%C4%B1n-durumu-42ce5d045623

SURELOG YAPAY ZEKA ÖZELLİKLERİ

Anomaly Detection with SureLog SIEM UEBA Module Using RPCA
https://www.surelogsiem.com/2021/04/01/anomaly-detection-with-surelog-siem-ueba-module-using-rpca/

Anomaly Detection with SureLog SIEM UEBA Module Using Markov Chain
https://www.surelogsiem.com/2021/03/01/anomaly-detection-with-surelog-siem-ueba-module-using-markov-chain/

SIEM Çözümlerinde Korelasyon ve Yapay Zeka
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-korelasyon-ve-yapay-zeka-4ca547d76377

SURELOG SIEM AND ADVANCED THREAT ANALYTICS WITH MACHINE LEARNING (ML)
https://www.surelogsiem.com/2019/06/21/surelog-siem-and-advanced-threat-analytics-with-machine-learning-ml/

SureLog SIEM Federated Anomaly Detection Engine Using Classification
https://www.surelogsiem.com/2019/07/19/surelog-siem-federated-anomaly-detection-engine-using-classification/

User and Entity Profiling with SureLog
https://www.surelogsiem.com/2019/08/19/user-and-entity-profiling-with-surelog/

SIEM, SOC ve BULUT

SOC, Bulutta SIEM veya Yönetilen SIEM Hizmetlerinde Madalyonun Öteki Yüzü
https://drertugrulakbas.medium.com/soc-bulutta-siem-veya-y%C3%B6netilen-siem-hizmetlerinde-madalyonun-%C3%B6teki-y%C3%BCz%C3%BC-98dae87154fd

Bulut ve Loglar
https://drertugrulakbas.medium.com/bulut-ve-loglar-b267a8bbf814

SOC Hizmeti Seçilirken Göz Ardı Edilen Arşiv Loglarının Akibeti
https://drertugrulakbas.medium.com/soc-hizmeti-se%C3%A7ilirken-g%C3%B6z-ard%C4%B1-edilen-ar%C5%9Fiv-loglar%C4%B1n%C4%B1n-akibeti-4865f2c72f7d

Can Organizations Meet Compliance Regulations with Cloud-Based SIEM Solutions?
https://drertugrulakbas.medium.com/can-organizations-meet-compliance-regulations-with-cloud-based-siem-solutions-c2897fbeb48f

SOC Önceliği Ne Olmalı?
https://drertugrulakbas.medium.com/soc-%C3%B6nceli%C4%9Fi-ne-olmal%C4%B1-7e139cd6dc9c

SIEM ve SOC PoC İpuçları -1
https://drertugrulakbas.medium.com/siem-ve-soc-poc-i%CC%87pu%C3%A7lar%C4%B1-1-3b833edb0266

SIEM DİSK KULLANIMI: CANLI ve ARŞİV LOGLAR

SIEM Çözümlerinin Az Log Miktarındaki Arama Performansına(Örnek 14 Milyon) Bakarak Çok Log Miktarındaki Arama Performansı(Örnek 79 Milyar) Nasıl Ölçülür?
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-canl%C4%B1-logdan-aramak-30-40-kat-daha-h%C4%B1zl%C4%B1d%C4%B1r-82a77e23134f

SIEM Çözümlerinde Canlı Logdan Aramak 30–40 Kat Daha Hızlıdır
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinin-az-log-miktar%C4%B1ndaki-arama-%C3%B6rnek-14-milyon-bakarak-%C3%A7ok-log-miktar%C4%B1ndaki-arama-8329ae896e10

SolarWinds’in Hacklenmesi Vakasında Olduğu Gibi APT Grupları Tarafından Gerçekleştirilen Saldırılar ve Bu Saldırıların Analizinde SIEM’in Yeri
https://drertugrulakbas.medium.com/solarwindsin-hacklenmesi-vakas%C4%B1nda-oldu%C4%9Fu-gibi-apt-gruplar%C4%B1-taraf%C4%B1ndan-ger%C3%A7ekle%C5%9Ftirilen-sald%C4%B1r%C4%B1lar-79e288d8fd68

SIEM’lerde Sıcak Veri (Canlı Log)
https://drertugrulakbas.medium.com/siemlerde-s%C4%B1cak-veri-canl%C4%B1-log-6843666dde6d

What is Hot Data and What is Archive Data in SIEM Solutions?
https://drertugrulakbas.medium.com/what-is-hot-data-and-what-is-archive-data-in-siem-solutions-145241480e67

SIEM ÇÖZÜMLERİNDE CANLI LOG NEDEN KRİTİKTİR?
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmleri%CC%87nde-canli-log-neden-kri%CC%87ti%CC%87kti%CC%87r-18eff7c4b613

SURELOG SIEM ARŞİV VE ARŞİVDEN GERİ DÖNME ÖZELLİĞİ

https://drertugrulakbas.medium.com/surelog-siem-ar%C5%9Fi%CC%87v-ve-ar%C5%9Fi%CC%87vden-geri%CC%87-d%C3%B6nme-%C3%B6zelli%CC%87%C4%9Fi%CC%87-90d92c0716fa

Canlı Log Neden Kritik? Arşiv Neden Yetersiz?
https://drertugrulakbas.medium.com/canl%C4%B1-log-neden-kritik-ar%C5%9Fiv-neden-yetersiz-4527d01fd623

SIEM Çözümlerinde Logların Canlıda Tutulması ile Arşivde Tutulmasının Farkı
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-loglar%C4%B1n-canl%C4%B1da-tutulmas%C4%B1-ile-ar%C5%9Fivde-tutulmas%C4%B1n%C4%B1n-fark%C4%B1-fe221ee8613b

SIEM ve Logları Çok Uzun Süre Canlıda Tutmanın Kritikliği — Sahadan Tecrübeler
https://drertugrulakbas.medium.com/siem-ve-loglar%C4%B1-%C3%A7ok-uzun-s%C3%BCre-canl%C4%B1da-tutman%C4%B1n-kritikli%C4%9Fi-sahadan-tecr%C3%BCbeler-e92c06588c77

Logların Arşivden Dönülmesi mi?
https://drertugrulakbas.medium.com/loglar%C4%B1n-ar%C5%9Fivden-d%C3%B6n%C3%BClmesi-mi-a82182741efd

SIEM Ürünlerinde Arşiv Log Kapasitesini Canlı Log Olarak Algılamak
https://drertugrulakbas.medium.com/siem-%C3%BCr%C3%BCnlerinde-ar%C5%9Fiv-log-kapasitesini-canl%C4%B1-log-olarak-alg%C4%B1lamak-9033c84a311c

SIEM İçin Canlıda Log Tutma ve Gerçek Zamanlı Aramanın Önemi
https://drertugrulakbas.medium.com/siem-i%CC%87%C3%A7in-canl%C4%B1da-log-tutma-ve-araman%C4%B1n-%C3%B6nemi-3d3142f73f60

SureLog Disk Kullanım Avantajları
https://medium.com/@eakbas/surelog-disk-kullan%C4%B1m-avantajlar%C4%B1-5111335b8416

YERLİ ve MİLLİ SIEM

SİBERKAFE Online Siber Güvenlik Sohbetleri — 21 / Yerli SIEM Ürünleri Sohbetine SureLog Olsa İdi İle Katkılarım
https://drertugrulakbas.medium.com/si%CC%87berkafe-online-siber-g%C3%BCvenlik-sohbetleri-21-yerli-siem-%C3%BCr%C3%BCnleri-sohbetine-surelog-olsa-i%CC%87di-ac234010f0fd

2015 Yılından SIEM ve Yerli/Milli ile İlgili Öngörüm
https://drertugrulakbas.medium.com/2015-y%C4%B1l%C4%B1ndan-siem-ve-yerli-milli-ile-i%CC%87lgili-%C3%B6ng%C3%B6r%C3%BCm-4fff7a5d5e16

SIEM EPS DEĞERLERİ VE SURELOG

SIEM Çözümlerinde EPS Limitleri Ne İşe Yarar? Veya Neyi Berbat Eder?Günlük Log Miktarı Ölçümü Farklı Mıdır?
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-eps-limitleri-ne-i%CC%87%C5%9Fe-yarar-ae6c624a86be

SIEM VE SURELOG

Gerçek SIEM Korelasyon Motorunun Faydaları
https://drertugrulakbas.medium.com/ger%C3%A7ek-siem-korelasyon-motorunun-faydalar%C4%B1-2879bd510de2

“At The Same Time” SIEM Operator
https://drertugrulakbas.medium.com/at-the-same-time-siem-operator-be8d6598b7b8

SIEM Çözümlerinde Operatörler
https://drertugrulakbas.medium.com/siem-%C3%A7%C3%B6z%C3%BCmlerinde-operat%C3%B6rler-181d13d8685a

SIEM Korelasyon Nedir? Neden Altın Değerindedir?
https://drertugrulakbas.medium.com/siem-korelasyon-nedir-neden-alt%C4%B1n-de%C4%9Ferindedir-8a1abdcaa9b2

SIEM ve Alarmları Korelasyon Sanmak
https://drertugrulakbas.medium.com/siem-ve-alarmlar%C4%B1-korelasyon-sanmak-13b20990dc32

Do We Need a Buzzword to Re-understand the Value of the SIEM Correlation?
https://drertugrulakbas.medium.com/do-we-need-a-buzzword-to-re-understand-the-value-of-the-siem-correlation-29315a6e713d

Is SIEM Correlation or Rules are Useless?
https://drertugrulakbas.medium.com/is-siem-correlation-or-rules-are-useless-d74c0b001e32

Önemsenmeyen veya Gözden Kaçan SIEM Korelasyon Motoru Özelliği -Gerçek Zamanlı Korelasyon-
https://drertugrulakbas.medium.com/%C3%B6nemsenmeyen-veya-g%C3%B6zden-ka%C3%A7an-siem-korelasyon-motoru-%C3%B6zelli%C4%9Fi-ger%C3%A7ek-zamanl%C4%B1-korelasyon-57d3f204352f

SIEM for SMB in 2020
https://drertugrulakbas.medium.com/siem-for-smb-in-2020-a04e3fe8e98d

En İyi SIEM Hangisi
https://drertugrulakbas.medium.com/en-i%CC%87yi-siem-hangisi-58da55aef21

SIEM Ürünlerinin Korelasyon Farkları
https://drertugrulakbas.medium.com/siem-%C3%BCr%C3%BCnlerinin-korelasyon-farklar%C4%B1-cec00847b8cb

SureLog SIEM Taxonomy ile Dikkatimizden Kaçan Olayları Yakalamak
https://drertugrulakbas.medium.com/surelog-siem-taxonomy-ile-dikkatimizden-ka%C3%A7an-olaylar%C4%B1-yakalamak-1a7716ff8d92

SureLog SIEM Korelasyon Kuralı Geliştirme Örnek Çalışması-1
https://drertugrulakbas.medium.com/surelog-siem-korelasyon-kural%C4%B1-geli%C5%9Ftirme-%C3%B6rnek-%C3%A7al%C4%B1%C5%9Fmas%C4%B1-1-2f0e8f03a00

GDPR Compliance: Simplify The Task with SureLog SIEM
https://drertugrulakbas.medium.com/gdpr-compliance-simplify-the-task-with-surelog-siem-27369482c956

Indicator of Attacks Detected with SureLog SIEM
https://drertugrulakbas.medium.com/indicator-of-attacks-detected-with-surelog-siem-152bc77f2c25

Behavior Models With SureLog
https://drertugrulakbas.medium.com/behavior-models-with-surelog-31f1a8a5d776

3 Best SureLog SIEM Features
https://drertugrulakbas.medium.com/3-best-surelog-siem-features-415130f74ebf

SureLog Predefined Reports Sample:Detect Password Changes and Password Resets With SureLog SIEM
https://drertugrulakbas.medium.com/surelog-predefined-reports-sample-detect-password-changes-and-password-resets-with-surelog-siem-1807d97f9a25

Not All SIEM Solutions Are Equal and Not All SIEM Use Cases Are the Same
https://drertugrulakbas.medium.com/not-all-siem-solutions-are-equal-and-not-all-siem-use-cases-are-the-same-cea9be0df6bb

ML/AI Is A Feature, Not A Silver Bullet And UEBA Questions
https://drertugrulakbas.medium.com/ml-ai-is-a-feature-not-a-silver-bullet-and-ueba-questions-d504a6926c4e

Don’t dismiss event correlation
https://drertugrulakbas.medium.com/dont-dismiss-event-correlation-6aa155565bbf

Never Seen Before Type of SIEM Rules
https://drertugrulakbas.medium.com/never-seen-before-type-of-siem-rules-6d31b2f622c2

SIEM Use Cases
https://drertugrulakbas.medium.com/best-siem-use-cases-95e53cffa7b3

GDPR SIEM Requirements
https://drertugrulakbas.medium.com/gdpr-siem-requirements-78330682b1d7

Siber Tehditleri Nasıl Tespit Edelim?
https://drertugrulakbas.medium.com/siber-tehditleri-nas%C4%B1l-tespit-edelim-51339d9c8d2c

Which Generation of SIEM?
https://drertugrulakbas.medium.com/which-generation-of-siem-b36dcd6a5cb6

Taxonomy Makes Raw Data Human Understandable
https://drertugrulakbas.medium.com/taxonomy-makes-raw-data-human-understandable-fbf92370139d

SIEM Sample Use Cases — Rules & Models
https://drertugrulakbas.medium.com/siem-sample-use-cases-rules-models-50407f0fb8c

SIEM Sistemlerinin Gereksinimlerini Hangi Parametreler Belirler?
https://drertugrulakbas.medium.com/siem-sistemlerinin-gereksinimlerini-hangi-parametreler-belirler-6b47a87cf741

ANATOMY OF SIEM USE CASES
https://drertugrulakbas.medium.com/anatomy-of-siem-use-cases-f7b8f3d56852

Neden SureLog SIEM?
https://drertugrulakbas.medium.com/neden-surelog-siem-8736321ab069

Neden Her SIEM Aynı SIEM Değildir?
https://medium.com/@eakbas/neden-her-siem-ayni-siem-degil-1022268b7527

Malware Fighting with SureLog SIEM
https://www.surelogsiem.com/2019/07/23/malware-fighting-with-surelog-siem

HOW TO SPOT AND STOP MALWARE?
https://medium.com/@eakbas/how-to-spot-and-stop-malware-9e5e8fc48242

SURELOG SIEM PROFILER
https://medium.com/@eakbas/surelog-siem-profiler-181dd9841c9f

Anatomy of an Intrusion Detection Using SureLog SIEM
https://medium.com/@eakbas/anatomy-of-a-intrusion-detection-using-surelog-siem-b8efa48087bf

Rule As a Code — SureLog Correlation Engine and Beyond
https://medium.com/which-generation-of-siem/rule-as-a-code-surelog-correlation-engine-and-beyond-90dc6ab9a52c

SIEM Taxonomy Makes Raw Data Human Understandable
https://medium.com/@eakbas/siem-taxonomy-makes-raw-data-human-understandable-eb8cdfb033a4

GDPR Access Monitoring Rules With SureLog SIEM -1
https://medium.com/@eakbas/gdpr-access-monitoring-rules-with-surelog-siem-1-c421bde8bb67

The True Power of SureLog Taxonomy
https://medium.com/@eakbas/the-true-power-of-surelog-taxonomy-c6a2cc2636e1

The Fastest Way to See What is Going on Your Network’s Security Aspect is SureLog SIEM
https://medium.com/@eakbas/the-fastest-way-to-see-what-is-going-on-your-networks-security-aspect-is-surelog-siem-f8dfa7700112

How to Search Billions of Logs Without learning New Script Language With SureLog SIEM?
https://medium.com/@eakbas/how-to-search-billions-of-logs-without-learning-new-script-language-with-surelog-siem-2e33aa38a4dd

A Quick Guide to Help You Understand and Create User Behavior Rules With SureLog SIEM -2
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rules-with-surelog-siem-2-dc31c6f62721

Never Seen Before Type of Rules With SureLog SIEM
https://medium.com/@eakbas/never-seen-before-type-of-rules-with-surelog-siem-cb3c0a7dc0c3

How is SureLog Different from Other SIEM Products?
https://medium.com/@eakbas/how-is-surelog-different-from-other-siem-products-40c41413c12f

SureLog SIEM User Behavior Monitoring Rules -New Account Use Detected
https://medium.com/@eakbas/surelog-ueba-941bed43f9ad

SureLog SIEM User Behavior Rule: “Detects when a user account is created and deleted in a short period of time.”
https://medium.com/@eakbas/surelog-ueba-3cbf478d319d

SIEM ile Saldırı Tespitinin Anatomisi
https://medium.com/@eakbas/siem-ile-saldırı-tespitinin-anatomisi-b44f3a8f4f0d

SureLog SIEM User Behavior Rule: “Detects when a user account is created and deleted in a short period of time.”
https://medium.com/@eakbas/surelog-siem-user-behaviour-rule-detects-when-a-user-account-is-created-and-deleted-in-a-short-a8420d6bae0

Database Audit And Correlation With SureLog SIEM
https://medium.com/@eakbas/database-audit-and-correlation-with-surelog-siem-e1e6a495f823

A Quick Guide to Help You Understand and Create User Behavior Rule With SureLog SIEM -1
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rule-with-surelog-siem-1-e59776dba80f

SureLog SIEM User Behavior Monitoring Rules — List
https://medium.com/@eakbas/surelog-siem-user-behaviour-monitoring-rules-18bcc94d334d

Look at How You Monitor Access Permissions with SureLog SIEM for GDPR
https://medium.com/@eakbas/look-at-how-you-montor-access-permissions-with-surelog-siem-f54af65cc63f

KRİTİK WINDOWS OLAY KAYITLARININ DETAYLI ANALİZİ VE AVUSTRALYA SİBER GÜVENLİK MERKEZİ TAVSİYELERİNİN SURELOG SIEM İLE UYGULANMASI
https://medium.com/@eakbas/kri̇ti̇k-windows-olay-kayitlarinin-detayli-anali̇zi̇-ve-avustralya-si̇ber-güvenli̇k-merkezi̇-2c2a4d204e25

Implementing Windows Advanced Logging Cheat Sheet with SureLog SIEM
https://medium.com/@eakbas/implementing-windows-advanced-logging-cheat-sheet-with-surelog-siem-45f7b3dcd4b

Creating New Dashboards With SureLog SIEM
https://medium.com/@eakbas/creating-new-dashboards-with-surelog-siem-a67232c84366

Why is taxonomy important? And Extensive SureLog SIEM Taxonomy Features
https://medium.com/@eakbas/why-is-taxonomy-important-and-extensive-surelog-siem-taxonomy-features-824ed40d89b3

Surelog Intelligence
https://www.slideshare.net/anetertugrul/surelog-intelligence

SEIM ve Taxonomy
https://www.linkedin.com/pulse/seim-ve-taxonomy-ertugrul-akbas

Intelligence in SureLog SIEM
https://www.linkedin.com/pulse/intelligence-surelog-siem-ertugrul-akbas

Enhancing SIEM Correlation Rules Through Baselining
https://www.researchgate.net/publication/314186993_Enhancing_SIEM_Correlation_Rules_Through_Baselining

SIEM ÇÖZÜMLERİNDE TAXONOMY NE İŞE YARAR?
https://www.slideshare.net/anetertugrul/siem-cozumlernde-taxonomy-ne-ise-yarar

Context Driven Scalable SIEM Solution
https://www.slideshare.net/anetertugrul/sure-log-context-sensitive-scalable-siem-solution

SINIFLANDIRMA TEMELLİ KORELASYON YAKLAŞIMI
https://www.slideshare.net/anetertugrul/siniflandirma-temell-korelasyon-yaklaimi

SURELOG TEHDIT ISTIHBARATI
https://www.slideshare.net/anetertugrul/surelog-tehdit-istihbarati

Log Yönetimi SIEM Demek Değildir!
https://www.slideshare.net/anetertugrul/log-ynetimi-siem-demek-deildir

KVKK ve SIEM

KVKK ya Nasıl Uyumlu Hale Gelebiliriz?
https://drertugrulakbas.medium.com/kvkk-ya-nas%C4%B1l-uyumlu-hale-gelebiliriz-e05ae8ac7b86

KVKK Nedir? Ne Değildir?
https://drertugrulakbas.medium.com/kvkk-nedir-ne-de%C4%9Fildir-395d615531f1

Kişisel Verileri Koruma Kanununa Uyum Çalışmalarının Karanlık Yönleri
https://drertugrulakbas.medium.com/ki%C5%9Fisel-verileri-koruma-kanununa-uyum-%C3%A7al%C4%B1%C5%9Fmalar%C4%B1n%C4%B1n-karanl%C4%B1k-y%C3%B6nleri-18c45bdb0d6c

KVKK İdari Tedbirler mi? Yoksa Teknik Tedbirler mi?
https://drertugrulakbas.medium.com/kvkk-i%CC%87dari-tedbirler-mi-yoksa-teknik-tedbirler-mi-98779d987551

KVKK İhlal bildirimleri ve Her SIEM Aynı SIEM Midir?
https://drertugrulakbas.medium.com/kvkk-siem-a739fab47e71

KVKK Veri İhlali Bildirimlerden Anladıklarım

https://medium.com/@eakbas/kvkk-veri-i%CC%87hlali-bildirimlerden-anlad%C4%B1klar%C4%B1m-67613ea094f4

KVKK Teknik Tedbirler
https://medium.com/@eakbas/kvkk-teknik-tedbirler-e0035db15ef7

Kişisel Verilerin Korunması Kanununa (KVKK) Nasıl Uyumlu Hale Geliriz?
https://medium.com/@eakbas/ki%C5%9Fisel-verilerin-korunmas%C4%B1-kanununa-kvkk-nas%C4%B1l-uyumlu-hale-geliriz-9d6db303b89f

KVKK Teknik Tedbirlerden Log Kayıtları MaddesiKVKK Teknik Tedbirlerden Log Kayıtları Maddesi
https://medium.com/@eakbas/kvkk-teknik-tedbirlerden-log-kay%C4%B1tlar%C4%B1-maddesi-bfa3e7c17231

SureLog, QRadar, ArcSight, Splunk, McAfee, LogSign, CRYPTOSIM, AlienVault SIEM Çözümlerinde KVKK, ISO27001, PCI ve Benzeri Süreçler Açısından Geçmişe Dönük Logların Yönetimi ve Disk İhtiyacı
https://medium.com/@eakbas/surelog-qradar-arcsight-splunk-mcafee-logsign-cryptosim-alienvault-siem-389bd822b602

KVKK SIEM Senaryo ve Kuralları
https://medium.com/@eakbas/kvkk-siem-senaryo-ve-kurallar%C4%B1-5fd8f3fe8077

KVKK ve SIEM
https://medium.com/@eakbas/kvkk-ve-siem-a34438bbc3b0

KVKK KAPSAMINDA Office 365 ve Gmail Kullanımı
https://medium.com/@eakbas/kvkk-kapsaminda-office-365-ve-gmail-kullanımı-6260ca99c292

KVKK Teknik Tedbirleri, Veri Keşfi, Silme ve Anonimleştirme
https://medium.com/@eakbas/kvkk-teknik-tedbirleri-ve-veri-keşfi-silme-ve-anonimleştirme-e9ee66f0a0fb

KVKK Teknik Tedbirleri
https://medium.com/@eakbas/kvkk-teknik-tedbirleri-30209dea746b

Kişisel Verilerin Korunması Kanununa (KVKK) Nasıl Uyumlu Hale Geliriz?
https://medium.com/@eakbas/kişisel-verilerin-korunması-kanununa-kvkk-nasıl-uyumlu-hale-geliriz-9d6db303b89f

KVKK ile İlgili Güvenlik Önerileri
https://medium.com/@eakbas/kvkk-ile-i̇lgili-güvenlik-önerileri-2990680a89a6

Kişisel Verilerin Korunması Kanununa (KVKK) Güvenlik Bakış Açısı İle Bakmak
https://medium.com/@eakbas/kişisel-verilerin-korunması-kanununa-kvkk-güvenlik-bakış-açısı-i̇le-bakmak-ab5a951d22f0

KVKK Projelerinde Göz Ardı Edilmesi Durumunda Ceza İle Karşılaşılabilecek Durumlar
https://medium.com/@eakbas/kvkk-projelerinde-göz-ardı-edilmesi-durumunda-ceza-i̇le-karşılaşılabilecek-durumlar-3dcc9f9846e

KVKK Kapsamında Veri Envanteri ve Veri Envanterinin Yetki Matrisi ve Yetki Kontrolü Açısından Önemi
https://medium.com/@eakbas/kvkk-kapsamında-veri-envanteri-ve-veri-envanterinin-yetki-matrisi-ve-yetki-kontrolü-açısından-81e6a8e52a56

KVKK İçin SIEM Ne Demek?
https://medium.com/@eakbas/kvkk-i̇çin-siem-ne-demek-ab0a514b449b

SIEM ve Veri Arama Motoru
https://www.linkedin.com/pulse/siem-ve-veri-arama-motoru-ertugrul-akbas

SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
https://medium.com/@eakbas/siem-ve-kvkk-teknik-tedbirlerinin-anet-surelog-siem-ile-uygulanması-e5dfd7dca7dc

KVKK ile SIEM İlişkisi Sadece Log Tutmak mı?
https://medium.com/@eakbas/kvkk-ile-siem-i̇lişkisi-sadece-log-tutmak-mı-97cef9233fa4

KVKK ve Siperium Veri Bulma (Data Discovery) ve Sınıflandırma (Data Classification)
https://medium.com/@eakbas/kvkk-ve-siperium-veri-bulma-data-discovery-8445bcf7d563

KVKK UYUMU BU KADAR ZOR VE PAHALI OLMASA GEREK!
https://www.linkedin.com/pulse/kvkk-uyumu-bu-kadar-zor-ve-pahali-olmasa-gerek-ertugrul-akbas/

SIEM ve SOC Hizmeti Seçerken Gözden Kaçanlar
https://medium.com/@eakbas/siem-soc-8101a4bb0d23

SURELOG SIEM KORELASYON KURALLARI

KVKK SIEM Senaryo ve Kuralları -2-
https://drertugrulakbas.medium.com/surelog-siem-only-unique-use-cases-bb0c2b20e5b5

SureLog SIEM Only Unique Use Cases
https://drertugrulakbas.medium.com/surelog-siem-only-unique-use-cases-bb0c2b20e5b5

Is There a Value On SIEM Product Without really Powerful Correlation Capability?
https://drertugrulakbas.medium.com/is-there-a-value-on-siem-product-without-really-powerful-correlation-capability-8377c9b48582

SIEM Senaryolarını Test Etmek veya Etmemek!
https://drertugrulakbas.medium.com/siem-senaryolar%C4%B1n%C4%B1-test-etmek-veya-etmemek-4510484b5602

SIEM PoC Çalışmaları İçin Hap Senaryo Örnekleri
https://drertugrulakbas.medium.com/siem-poc-%C3%A7al%C4%B1%C5%9Fmalar%C4%B1-i%CC%87%C3%A7in-hap-senaryo-%C3%B6rnekleri-696e1569e689

Detecting Unusual Activities Using a Next Generation SIEM -Use Cases Part 2
https://drertugrulakbas.medium.com/detecting-unusual-activities-using-a-next-generation-siem-use-cases-part-2-27b201bcc127

Detecting Unusual Activities Using a Next Generation SIEM: Use Cases
https://drertugrulakbas.medium.com/detecting-unusual-activities-using-a-next-generation-siem-use-cases-d91f4e24b0f2

SIEM Use Case -Korelasyon Yeteneği Analizi Örnek Çalışması -1
https://drertugrulakbas.medium.com/siem-use-case-1-be12b9eb9d46

What is a SIEM Use Case? How to Compare SIEM Use Cases? Breaking Down the SIEM Use Cases
https://drertugrulakbas.medium.com/what-is-a-siem-use-case-how-to-compare-siem-use-cases-breaking-down-the-siem-use-cases-d73688fe28e2

SIEM Use Case -IBM Qradar İle Korelasyon Analizi Örnek Çalışması-
https://drertugrulakbas.medium.com/siem-use-case-ibm-qradar-i%CC%87le-korelasyon-yetene%C4%9Fi-analizi-%C3%B6rnek-%C3%A7al%C4%B1%C5%9Fmas%C4%B1-63694e4eeb57

Surelog SIEM ile Saldırı Tespitinin Anatomisi

https://medium.com/@eakbas/siem-ile-sald%C4%B1r%C4%B1-tespitinin-anatomisi-b44f3a8f4f0d

SureLog SIEM Sample Use Cases -Rules&Models
https://medium.com/@eakbas/surelog-siem-sample-use-cases-rules-models-c50a945ca5b3

SureLog SIEM User Behavior Monitoring Rules — List
https://medium.com/@eakbas/surelog-siem-user-behaviour-monitoring-rules-18bcc94d334d

GDPR Access Monitoring Rules With SureLog SIEM -1
https://medium.com/@eakbas/gdpr-access-monitoring-rules-with-surelog-siem-1-c421bde8bb67

A Quick Guide to Help You Understand and Create User Behavior Rule With SureLog SIEM -1
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rule-with-surelog-siem-1-e59776dba80f

SureLog SIEM User Behavior Rule: “Detects when a user account is created and deleted in a short period of time.”
https://medium.com/@eakbas/surelog-siem-user-behaviour-rule-detects-when-a-user-account-is-created-and-deleted-in-a-short-a8420d6bae0

SureLog SIEM User Behavior Monitoring Rules -New Account Use Detected
https://medium.com/@eakbas/surelog-ueba-941bed43f9ad

A Quick Guide to Help You Understand and Create User Behavior Rules With SureLog SIEM -2
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rules-with-surelog-siem-2-dc31c6f62721

SureLog Rule Model For A User VPNs To the Network from A New Location for The First Time Then Accesses A Shared File System
https://medium.com/@eakbas/surelog-rule-model-for-a-user-vpns-to-the-network-from-a-new-location-for-the-first-time-then-933258c6c702

SureLog SIEM Threat Detection Use Case Samples
https://medium.com/@eakbas/surelog-siem-threat-detection-use-case-samples-a974eb9c2f34

Detecting Personally Identifiable Information (PII) Breaches With SureLog SIEM
https://medium.com/@eakbas/detecting-personally-identifiable-information-pii-breaches-with-surelog-siem-da5cffba0771

A Quick Guide to Help You Understand and Create User Behavior Rules With SureLog SIEM-4
https://medium.com/@eakbas/a-quick-guide-to-help-you-understand-and-create-user-behavior-rules-with-surelog-siem-4-96a1d158c422

KVKK SIEM Senaryo ve Kuralları
https://medium.com/@eakbas/kvkk-siem-senaryo-ve-kurallar%C4%B1-5fd8f3fe8077

--

--

Ertugrul Akbas
Ertugrul Akbas

Written by Ertugrul Akbas

Entrepreneur,Security Analyst,Research.

No responses yet