All of the resources you need to defend yourself against adversaries.
Expand your cybersecurity knowledge with the most robust resources developed by our ICS experts.
Arm yourself with the best cybersecurity guidance to better understand — and protect — your critical infrastructure.
EvtxToElk: A Python Module to Load Windows Event Logs into ElasticSearch
Query Focused Datasets
Threat Hunting With Python Part 4: Examining Microsoft SQL Based Historian Traffic
Threat Hunting With Python Part 3: Taming SMB
Threat Hunting With Python Part 2: Detecting Nmap Behavior with Bro HTTP Logs
Threat Hunting With Python Part 1
Threat Hunting Part 2: Hunting on ICS Networks
Meet Dragos experts at our next eventVIEW MORE EVENTS
See our ICS cybersecurity experts in action at our upcoming events and webinars.