- Snort Rules Explanation
https://www.snort.org/rules_explanation - Introduction to IoC http://openioc.org/resources/An_Introduction_to_OpenIOC.pdf
- IoC Editor https://www.fireeye.com/content/dam/fireeye-www/services/freeware/sdl-ioc-editor.zip
- DUQU Uses STUXNET-Like Techniques to Conduct Information Theft
- How to Select a Network Intrusion Prevention System (IPS)
https://www.icsalabs.com/sites/default/files/HowToSelectANetworkIPS.pdf
- Detect Security Breaches Early by Analyzing Behavior
https://www.gartner.com/smarterwithgartner/detect-security-breaches-early-by-analyzing-behavior/
- Advanced Threat Analytics attack simulation playbook
https://docs.microsoft.com/en-us/enterprise-mobility-security/solutions/ata-attack-simulation-playbook ...