Ransomware has become a huge problem in the last few years, and the task of detecting it remains a challenge. This post provides some examples of SIEM rules for detecting common ransomware behaviors, including high-frequency file deletion, process termination and service termination, as well as ransomware extensions files and more.

Add Ransomware Detection Rules to Your SIEM

Microsoft Power Platform

Microsoft Power Platform is a line of business tools designed to make it easy for developers to create data workflows for web and mobile applications. Unfortunately, those flows often violate data protection policies and create data paths that are difficult for security teams to monitor. …

Money is an item and verifiable record that is generally accepted based on trust as payment for goods, services and repayment of debts with distinguished functions of medium of exchange, a unit of account, a store of value and a standard of deferred payment.

“Any item of verifiable record that…


I am passionate about Technology, Cloud Computing, Machine Learning, Blockchain and Finance. All opinions are my own and do not express opinions of my employer.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store