References
- Snort Rules Explanationhttps://www.snort.org/rules_explanation
- Introduction to IoC http://openioc.org/resources/An_Introduction_to_OpenIOC.pdf
- IoC Editor https://www.fireeye.com/content/dam/fireeye-www/services/freeware/sdl-ioc-editor.zip
- DUQU Uses STUXNET-Like Techniques to Conduct Information Theft
- How to Select a Network Intrusion Prevention System (IPS)
https://www.icsalabs.com/sites/default/files/HowToSelectANetworkIPS.pdf
- Detect Security Breaches Early by Analyzing Behavior
https://www.gartner.com/smarterwithgartner/detect-security-breaches-early-by-analyzing-behavior/
- Advanced Threat Analytics attack simulation playbookhttps://docs.microsoft.com/en-us/enterprise-mobility-security/solutions/ata-attack-simulation-playbook
- You and IaaS - Learning from the success of early adoptershttps://www.oracle.com/assets/pulse-survey-mini-report-3764078.pdf