<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: LimaCharlie</title>
    <description>The latest articles on DEV Community by LimaCharlie (@limacharlieio).</description>
    <link>https://dev.to/limacharlieio</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5889%2F039c2b6c-fe17-450a-81f9-bca73f4a0278.png</url>
      <title>DEV Community: LimaCharlie</title>
      <link>https://dev.to/limacharlieio</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/limacharlieio"/>
    <language>en</language>
    <item>
      <title>Domain and IP intelligence with alphaMountain and LimaCharlie</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Wed, 07 Jun 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/domain-and-ip-intelligence-with-alphamountain-and-limacharlie-3c09</link>
      <guid>https://dev.to/limacharlieio/domain-and-ip-intelligence-with-alphamountain-and-limacharlie-3c09</guid>
      <description>&lt;p&gt;LimaCharlie gives you the ability to collate and correlate data of any type, enriching it with threat intelligence and allowing for real-time, actionable decisions. Today, we are excited to discuss our new integration with &lt;a href="https://www.alphamountain.ai/"&gt;alphaMountain&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Utah-based alphaMountain provides domain and IP threat intelligence that helps security architects and analysts make better, faster decisions about the risks posed by a host on the internet. alphaMountain’s analysis uses machine learning to instantly render a threat score along with contextual enrichment including visitless site categorization, related hosts, threat factors, passive DNS, certificates, redirect chains and more. alphaMountain data is delivered in multiple formats, and is easily coupled with network-based telemetry in LimaCharlie.&lt;/p&gt;

&lt;p&gt;We currently support three alphaMountain API-based lookups:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain Category (alphamountain-category)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Returns categorization for Internet URIs, generated by alphaMountain's own statistical and neural network models. For more information on alphaMountain's categories, visit &lt;a href="https://alphamountain.freshdesk.com/support/solutions/articles/66000280079-a9-web-protection-categories-grouped-"&gt;their knowledge base&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain Popularity (alphamountain-popularity)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Returns the popularity of a domain, as measured by a combination of page-rank, daily traffic bandwidth, total number of requests, and passive DNS activity for a given hostname. For more information, visit &lt;a href="https://www.alphamountain.ai/api/#tag/Domain/paths/~1popularity~1domain/post"&gt;their knowledge base.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain Threat (alphamountain-threat)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Returns threat ratings for Internet URIs, generated by alphaMountain's own statistical and neural network models, cross-validated by a variety of sources as appropriate. For more information, visit &lt;a href="https://www.alphamountain.ai/threat-intelligence-feeds-api/"&gt;their knowledge base&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Telemetry Integration
&lt;/h2&gt;

&lt;p&gt;With LimaCharlie’s free tier, you can easily get a test instance up and running without any charge, and begin integrating with alphaMountain’s data in minutes.&lt;/p&gt;

&lt;p&gt;alphaMountain’s API integrations can be enabled from the &lt;a href="https://app.limacharlie.io/add-ons/category/api"&gt;API Marketplace&lt;/a&gt;. Please note, you’ll need an API key in order to successfully query alphaMountain data. (You can request your free trial alphaMountain API key at &lt;a href="http://www.alphamountain.ai/"&gt;www.alphamountain.ai&lt;/a&gt;.)&lt;/p&gt;

&lt;p&gt;Once enabled, you can make calls to the respective API(s) directly from a detection and response rule. For example, the following rule will perform a Domain Category lookup against domains found in &lt;a href="https://docs.limacharlie.io/v1/docs/reference-events-system-network#dnsrequest"&gt;DNS_REQUEST&lt;/a&gt; events.&lt;/p&gt;

&lt;p&gt;Along with typical D&amp;amp;R rule data, you will also receive alphaMountain-specific metadata. These metadata results can also be referenced via LimaCharlie’s &lt;code&gt;metadata_rules&lt;/code&gt;. For additional automated actions, LimaCharlie also adds a threatYeti URL. See below:&lt;/p&gt;

&lt;p&gt;References to the other alphaMountain APIs will be similar in request and response, allowing you to craft custom detection rules based on API results.&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting Started with LimaCharlie and alphaMountain
&lt;/h2&gt;

&lt;p&gt;To explore the integration with LimaCharlie and alphaMountain, &lt;a href="https://app.limacharlie.io/signup"&gt;try our full-featured free tier&lt;/a&gt; or &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;schedule a demo with our solution engineers.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Additionally, we'll be hosting a live webinar on June 13, 2023 at 10:00am PT discussing the integration in more detail. &lt;a href="https://my.demio.com/ref/vRYCUfxSutVjj5My?utm_source=blog"&gt;Register for the event.&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Early Warnings with LimaCharlie + Canarytokens</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Mon, 24 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/early-warnings-with-limacharlie-canarytokens-3fbg</link>
      <guid>https://dev.to/limacharlieio/early-warnings-with-limacharlie-canarytokens-3fbg</guid>
      <description>&lt;p&gt;Here at LimaCharlie, we believe in utilizing as much telemetry as possible to gain insight into suspicious activity within your environment. Our platform allows for you to create or import detection rules, like Sigma or SnapAttack, quickly, so your team can get up and running. Wider visibility means higher fidelity detections. However, what if we could utilize a simple, yet effective, tool to provide an earlier warning of potential attacks? This is where Canarytokens come in. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://thinkst.com/"&gt;&lt;u&gt;Thinkst&lt;/u&gt;&lt;/a&gt; Canarytokens is an innovative tool that allows you to place decoy files, URLs, and other bait on your network or endpoints. When a Canarytoken is triggered, you'll receive an alert, allowing you to take immediate action to prevent any potential threats. With LimaCharlie’s webhook ingestion, we can easily push Canarytoken alerts into LimaCharlie. Let’s walk through this process.&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting started with the Canarytokens integration
&lt;/h2&gt;

&lt;p&gt;Getting started with LimaCharlie and Canarytokens is easy. Simply sign up for a free account and follow the easy setup instructions. With LimaCharlie's user-friendly interface and Canarytokens' simple deployment process, you can have both systems up and running in no time.&lt;/p&gt;

&lt;p&gt;Head over to &lt;a href="https://canarytokens.org"&gt;&lt;u&gt;Canarytokens.org&lt;/u&gt;&lt;/a&gt; and select the type of token you want to create. For this blog post, we’ll create a Canary that monitors for command execution. We’re going to monitor usage of ping.exe (you might want to modify this for sensitive commands, or deploy multiple Canaries on key systems). More information about this canary type is available on &lt;a href="https://docs.canarytokens.org/guide/ms-word-token.html"&gt;&lt;u&gt;Canarytokens’ documentation&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Let’s head back to LimaCharlie to create a dedicated Canary Token input. We’ve made this super easy for you - simply select “Canary Token” as a new sensor type (This can also be done via the LimaCharlie API or CLI - more detailed documentation on this &lt;a href="https://doc.limacharlie.io/docs/documentation/eba9d0d4e6457-webhook-ingestion"&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt;):&lt;/p&gt;

&lt;p&gt;You’ll need an Installation Key and a secret value, which can be an arbitrary value unique to this webhook:&lt;/p&gt;

&lt;p&gt;Once created, you’ll have your webhook listed in the ‘Cloud Adapters’ section of the Sensors list.&lt;/p&gt;

&lt;p&gt;The URL to push to this webhook, which you’ll need to finish the Canarytokens configuration, will include the following:&lt;/p&gt;

&lt;p&gt;Grab this URL, head back to Canarytokens, and input it in the appropriate field. Give your Canary some metadata, the process name, and install the registry key on the system(s) of interest. Now, we wait for someone to bite!&lt;/p&gt;

&lt;h2&gt;
  
  
  Canary Webhook Data in LimaCharlie
&lt;/h2&gt;

&lt;p&gt;Luckily, this is all the configuration needed to get Canarytokens data into LimaCharlie. Now, we wait for a Canary to get tripped, which will send an alert to the specified webhook URL. Navigating to the ‘Timeline’ data of our webhook sensor, there is a chance you’ll see an initial “this works” message:&lt;/p&gt;

&lt;p&gt;We installed the Canary on a test system and executed our monitored binary - within a second or two, we had a Canary token event represented in our LimaCharlie timeline. Here’s an example alert:&lt;/p&gt;

&lt;p&gt;Note that we have some useful metadata associated with the token, including command prompt user and hostnames. Other tokens, such as Office documents, provide significantly more metadata. Given the Canarytoken’s JSON format, the data ingests cleanly into LimaCharlie and requires little follow-up on our part.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detecting on Canary Events
&lt;/h2&gt;

&lt;p&gt;We’re almost done - the final step is to ensure that Canarytokens appear in our Detections menu, rather than just in the timeline. Remember, Canarytokens come with an inherent fidelity - if they are placed in key locations and opened/accessed/tripped, we are already suspicious of the activity. Thus, a Canarytoken alert itself is enough to generate a detection.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Quick Note&lt;/em&gt;: &lt;em&gt;Why not just bring Canarytokens in as detections? We like the idea of keeping the data separate, so you can refer back to Canarytoken data in its own timeline, rather than having to browse through the detection data.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Looking at the Canarytokens’ data, we can see that the data is in simple structured JSON, and we can write a quick rule for it:&lt;/p&gt;

&lt;p&gt;All we’re looking for is a token_hit from our canary_token platform - eliminating the need to pivot on sensor details for fidelity. However, notice we transform the reported name of the detection by incorporating the hostname of the system provided in the Canary.&lt;/p&gt;

&lt;p&gt;By combining LimaCharlie's EDR capabilities with Canarytokens' early warning system, you can create a powerful, layered defense that will keep your organization safe from even the most sophisticated cyber attacks. To see for yourself how you can leverage Canarytokens with LimaCharlie, &lt;a href="https://app.limacharlie.io/signup"&gt;try our full-featured free tier&lt;/a&gt; or &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;book a demo.&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Blumira speeds time to market by building with LimaCharlie</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Tue, 18 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/blumira-speeds-time-to-market-by-building-with-limacharlie-54g3</link>
      <guid>https://dev.to/limacharlieio/blumira-speeds-time-to-market-by-building-with-limacharlie-54g3</guid>
      <description>&lt;h2&gt;
  
  
  Learn how this cloud SIEM provider leveraged LimaCharlie to develop a new cybersecurity product for SMBs
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Enterprise-grade security for SMBs
&lt;/h2&gt;

&lt;p&gt;Like all cybersecurity providers, Blumira has had to respond to the rise of remote and hybrid work models. But given Blumira’s focus on SMBs and mid-market companies, they found many businesses in their target market priced out of mature endpoint monitoring solutions—or without the technical ability and infrastructure to run the endpoint agents a larger organization might use. &lt;/p&gt;

&lt;p&gt;For this reason, Blumira decided to offer its own endpoint monitoring solution: a product that could collect Windows endpoint logs and send them to &lt;a href="https://www.blumira.com/product/cloud-siem/"&gt;&lt;u&gt;Blumira's cloud SIEM platform&lt;/u&gt;&lt;/a&gt; for analysis, detection and threat response without requiring additional infrastructure or management on the part of the customer. &lt;/p&gt;

&lt;p&gt;However, after some initial planning, Blumira’s leadership team decided not to develop the endpoint agent independently. “We had the technical ability to build the entire product from scratch,” says Jake Payton, Director of Engineering at Blumira. “But getting an agent to maturity ourselves—on top of everything else we wanted to do on our timeline—just wasn’t realistic.”&lt;/p&gt;

&lt;h2&gt;
  
  
  Mature capabilities, delivered on demand
&lt;/h2&gt;

&lt;p&gt;Blumira began looking for a technology that could support their proposed endpoint monitoring solution, &lt;a href="https://www.blumira.com/product/blumira-agent/"&gt;&lt;u&gt;Blumira Agent&lt;/u&gt;&lt;/a&gt;, while also integrating well with the rest of their platform. &lt;/p&gt;

&lt;p&gt;“The biggest challenge was finding a mature enough solution that we could build on quickly and still end up with something as good as what we had elsewhere,” says Payton. “We also wanted a real partner during the development process. We didn’t want to just buy something off the shelf and have to read a manual hoping to figure things out at every step of the way.” &lt;/p&gt;

&lt;p&gt;After considering NXlog, winlogbeat, Telegraf, and a number of potential agents, Blumira found that cybersecurity middleware vendor LimaCharlie offered the best balance of capabilities, cost, and support.&lt;/p&gt;

&lt;p&gt;LimaCharlie takes an unusual approach to cybersecurity. The company offers users an ecosystem of &lt;a href="https://limacharlie.io/catalog"&gt;&lt;u&gt;100+ mature capabilities and integrations&lt;/u&gt;&lt;/a&gt; as cloud-native primitives. Similar to the way AWS provides IT capabilities and web services, LimaCharlie uses an IaaS model in which everything is delivered on-demand, as-needed, and API-first—no contracts, price modeling, or fixed minimums required. &lt;/p&gt;

&lt;p&gt;“LimaCharlie is like a box of Lego blocks for cybersecurity,” says company co-founder Christopher Luft. “There is no one-size-fits-all solution to cybersecurity problems. Our approach gives teams the flexibility to build and customize solutions as needed.”&lt;/p&gt;

&lt;h2&gt;
  
  
  Concept to GA in five months
&lt;/h2&gt;

&lt;p&gt;As development began, Blumira soon noticed the advantages of working with an infrastructure-first, engineering-centric cybersecurity vendor. &lt;/p&gt;

&lt;p&gt;One of LimaCharlie’s core capabilities is multi-source telemetry ingestion. On endpoints, this is accomplished via the lightweight, multi-platform LimaCharlie agent. Telemetry data is pulled into the LimaCharlie cloud and standardized to a common data format. From there, data can be exported to any destination. This functionality gave Blumira an agent that would offer excellent visibility into remote Windows endpoints without straining user resources—grabbing Windows events and log data from hosts and sending them on to the Blumira cloud for processing. In addition, because the LimaCharlie agent is able to take action on endpoints, Blumira would also be able to monitor and/or halt ingestion and take appropriate response actions as needed. &lt;/p&gt;

&lt;p&gt;Access to cloud-native primitives meant that Blumira’s developers could integrate advanced capabilities into their existing SIEM infrastructure quickly and easily. This was often as simple as setting up an API call between the two platforms, and was essential in shortening time to market. Development work began in August 2022, and Blumira Agent launched in January 2023. In the time that most vendors would take to perform feasibility studies, Blumira had delivered an advanced remote endpoint monitoring solution for SMBs.&lt;/p&gt;

&lt;p&gt;Blumira says that the product has been a resounding success. Agent is the powerful and easy-to-use solution that the company had envisioned. Users find the installation process to be fast and simple. After installation, management is hands-off, as intended.&lt;/p&gt;

&lt;p&gt;As for the experience of building with LimaCharlie, Blumira was extremely satisfied: &lt;/p&gt;

&lt;p&gt;“At every step of the way, the technology more than met our needs,” says Payton. “And in terms of the partnership, it was always easy to get information and guidance. If we had a question, we got the answers we needed very, very quickly. The LimaCharlie team was a joy to work with.”&lt;/p&gt;

&lt;h2&gt;
  
  
  A platform built for builders
&lt;/h2&gt;

&lt;p&gt;For Blumira, one of the added benefits of working with LimaCharlie was that they could use just as much of the platform as they wanted—without being forced to purchase features and capabilities they didn’t need. &lt;/p&gt;

&lt;p&gt;The LimaCharlie platform is extensive. Built on an advanced Detection, Automation, and Response Engine, it is designed for cybersecurity automation and sophisticated security disciplines such as detection engineering. Use cases are thus broad, and encompass MSSP, DFIR, and enterprise SOCs.  &lt;/p&gt;

&lt;p&gt;But in building Blumira Agent, the company’s developers were able to choose the capabilities that worked for them, and leave the rest aside for the future—a future that Payton views with optimism: &lt;/p&gt;

&lt;p&gt;“We aren’t even close to using all of the capabilities in LimaCharlie. We're still just scratching the surface of our partnership together. I'm already excited about this partnership—and I’m excited about where it’s going to go in the years to come.”&lt;/p&gt;

&lt;p&gt;In terms of their own vision for the future, LimaCharlie believes that the on-demand, engineering-centric model they’ve pioneered is the way to move the industry forward. &lt;/p&gt;

&lt;p&gt;“LimaCharlie is security done differently—and our technology partners benefit from that difference,” says Luft. “It’s a very new approach, but we feel that in time cybersecurity professionals will stop asking “Should we do it this way” and will instead ask “Why would we do it any other way?”&lt;/p&gt;

&lt;p&gt;type: asset-hyperlink id: 25K1Lmhrg68aG4rR35w2U9&lt;/p&gt;

&lt;h2&gt;
  
  
  About LimaCharlie
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://limacharlie.io"&gt;&lt;u&gt;LimaCharlie&lt;/u&gt;&lt;/a&gt; is cybersecurity middleware that gives teams full control and visibility over their security posture. Build on an advanced Detection, Automation, and Response Engine. Lower startup costs with our free tier and pay-per-use infrastructure. Shorten time to market by leveraging a public API and a powerful ecosystem of 100+ infrastructure components and integrations. Then scale with confidence by taking advantage of our transparent, predictable pricing and pure usage-based billing options. &lt;/p&gt;

&lt;h2&gt;
  
  
  About Blumira
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://blumira.com/"&gt;&lt;u&gt;Blumira&lt;/u&gt;&lt;/a&gt; makes security easy and effective, especially for mid-market and smaller companies, helping them detect and respond to cybersecurity threats faster to stop breaches and ransomware. Blumira's all-in-one SIEM platform combines logging with endpoint security and automated detection and response for better outcomes and consolidated security spend. Blumira was recognized by G2 as a Momentum leader, ranked as “Fastest Implementation,” “Easiest to Use,” and “Best Results” in the G2 Winter 2023 Grid® Reports. Meet compliance controls, save time on security tasks, focus on real threats and protect against a breach faster than ever with Blumira.&lt;/p&gt;

&lt;h2&gt;
  
  
  Start building with LimaCharlie
&lt;/h2&gt;

&lt;p&gt;To explore what you can build with LimaCharlie, &lt;a href="https://app.limacharlie.io/signup"&gt;try our full-featured free tier&lt;/a&gt; or &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;schedule a demo with our solution engineers.&lt;/a&gt;&lt;/p&gt;

</description>
      <category>securty</category>
      <category>startup</category>
    </item>
    <item>
      <title>Creating a cybersecurity startup with LimaCharlie</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Tue, 11 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/creating-a-cybersecurity-startup-with-limacharlie-4bhc</link>
      <guid>https://dev.to/limacharlieio/creating-a-cybersecurity-startup-with-limacharlie-4bhc</guid>
      <description>&lt;p&gt;LimaCharlie takes a radically different approach to cybersecurity, providing mature security capabilities and infrastructure in an on-demand, pay-per-use way. This opens up exciting opportunities for entrepreneurs who want to create their own cybersecurity startup using LimaCharlie.&lt;/p&gt;

&lt;h2&gt;
  
  
  The challenges faced by cybersecurity startups
&lt;/h2&gt;

&lt;p&gt;Before we talk about why LimaCharlie makes such a great foundation for a cybersecurity business, it will be helpful to review the challenges faced by startups in the space.&lt;/p&gt;

&lt;p&gt;Cybersecurity startups have to solve the same problems that all fledgling companies do—plus a few that are unique to the industry:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The difficulty of staking out space in a competitive—and crowded—marketplace&lt;/strong&gt; : There are thousands of cybersecurity companies today, and organizations are sensitive to the &lt;a href="https://www.forbes.com/sites/forbestechcouncil/2022/08/10/cybersecurity-budgets-are-wasted-by-an-overabundance-of-tools/?sh=30d1bc326e75"&gt;&lt;u&gt;problem of cybersecurity vendor sprawl&lt;/u&gt;&lt;/a&gt;. For a cybersecurity startup, differentiating yourself, or convincing a company to add you to their burgeoning list of security vendors, is a major hurdle.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The need to deliver value while controlling costs&lt;/strong&gt; : It’s a universal quandary for new businesses: How do you offer enterprise-class products and services on a ramen budget? There’s no easy answer—and that leads to overspending or, perhaps just as harmful, accepting investor funding with too many strings attached. Unfortunately, this often results in insolvency and/or the loss of control of one’s vision.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A low tolerance for failure&lt;/strong&gt; : Cybersecurity is an unusually unforgiving environment for startups because the stakes are so high. The &lt;a href="https://www.ibm.com/downloads/cas/3R8N1DZJ"&gt;&lt;u&gt;cost of a cyber incident&lt;/u&gt;&lt;/a&gt; at a large company can be staggering. And at a small one, it can be fatal: Statistics show that &lt;a href="https://www.bbc.com/news/business-63260648"&gt;&lt;u&gt;60% of small businesses close&lt;/u&gt;&lt;/a&gt; within six months of a cyber attack. This has two effects. First, if you ask a company to trust you with their security, you’re essentially asking them to trust you with their business. Initial sales are more challenging in cybersecurity. In addition, the reputational damage to cybersecurity startups from a single failure or mistake can be catastrophic. Vendors in other spaces are given second chances. Security providers, not so much.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The need to find a fit when the clock is ticking&lt;/strong&gt; : Like any new company, a cybersecurity startup needs to go to market, get feedback, and begin to iterate as quickly as possible—hopefully in time to develop a profitable product or service with strong demand and  good growth potential. But for the majority of startups, the race to find that elusive product-market fit ends in failure, either &lt;a href="https://www.cnbc.com/2023/01/20/top-reasons-why-startups-failed-in-2022-study.html"&gt;&lt;u&gt;because they run out of cash or fail to secure funding&lt;/u&gt;&lt;/a&gt; before they do.&lt;/p&gt;

&lt;h2&gt;
  
  
  The opportunities for cybersecurity startups
&lt;/h2&gt;

&lt;p&gt;It’s not all doom and gloom for cybersecurity startups, however. There are some excellent opportunities in the security space—some of which aren’t found in other industries:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A trend toward products that scale&lt;/strong&gt; : When you’re dealing with security technologies and software, it’s significantly easier to scale. Physical infrastructure, for example, is not as much of an issue as it is manufacturing. Security products delivered on an SaaS model are almost infinitely scalable, as long as your infrastructure is robust and your hiring keeps pace with the needs of your users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Customers who are receptive to innovation&lt;/strong&gt; : Some industries are notoriously hidebound, and insist on doing things the way they’ve always been done. But when it comes to cybersecurity, almost every company is looking for innovative new security technologies—because they’ve seen that cyber threats are growing worse, and that legacy tools don’t seem to be helping much. Innovative cybersecurity companies that can demonstrate their value will receive a warm welcome in most businesses. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A marked preference for automation&lt;/strong&gt; : Startups in every sector face the challenge of delivering outsized performance with just a handful of employees. The good news for cybersecurity startups is that their potential customers are already &lt;a href="https://limacharlie.io/blog/limacharlie-as-a-low-cost-way-to-improve-cyber-resilience"&gt;&lt;u&gt;looking for solutions that incorporate automation&lt;/u&gt;&lt;/a&gt;. That confers a dual advantage to cybersecurity startups, because the use of automation technology answers two needs at the same time: It makes it possible to deliver high-performance products and services with a small team—and it offers buyers what they’re already asking for.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why LimaCharlie is a game-changer for startups
&lt;/h2&gt;

&lt;p&gt;In light of the above, it’s easy to see how LimaCharlie’s unique approach to security provides massive benefits to cybersecurity startups. Here are the most important ones:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LimaCharlie speeds time to market.&lt;/strong&gt; LimaCharlie provides mature cybersecurity capabilities and infrastructure in a modular way.Similar to what AWS does for IT, LimaCharlie gives startups the abstract ability to “do cybersecurity,” rather than attempting to sell them a prepackaged product. LimaCharlie is built on a powerful Detection, Automation, and Response Engine, giving security teams a solid foundation on which to &lt;a href="https://limacharlie.io/blog/get-to-market-quicker-with-limacharlie"&gt;&lt;u&gt;build a product or service offering&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LimaCharlie makes it easier for startups to differentiate themselves&lt;/strong&gt;. LimaCharlie is &lt;em&gt;not&lt;/em&gt; just some product for startups to white-label. Rather, our platform is an ecosystem of advanced security technologies and infrastructure, delivered on-demand and via an open API, that can be used, rearranged, or modified as needed to deliver a truly customized product or service offering. It’s why we sometimes compare LimaCharlie to a box full of Lego blocks for cybersecurity professionals—and why the platform is built for customization and differentiation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Predictable pricing, cost savings, and flexibility&lt;/strong&gt;. Everything in LimaCharlie is pay-per-use and on-demand, with no contracts, price modeling, or capacity planning. Pricing is &lt;a href="https://limacharlie.io/pricing-calculator"&gt;&lt;u&gt;transparent and easy to understand&lt;/u&gt;&lt;/a&gt;—and also happens to be extremely competitive when compared with other vendors. All of this makes it easier for startups to plan ahead, stay within their budget, and scale up or down as needed without worry. We even offer a full-featured free tier, making it possible to begin your initial research and development work at zero cost.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;An engineering-centric approach&lt;/strong&gt;. LimaCharlie takes an &lt;a href="https://limacharlie.io/blog/engineering-approach-cybersecurity"&gt;&lt;u&gt;engineering approach to cybersecurity&lt;/u&gt;&lt;/a&gt;. For established security teams, this makes it easier to practice advanced cybersecurity disciplines like &lt;a href="https://limacharlie.io/blog/customer-interview-soteria"&gt;&lt;u&gt;detection engineering&lt;/u&gt;&lt;/a&gt;. But for startups, the point to remember is that our platform is built with iteration in mind. This greatly speeds development work, allowing you to pivot quickly in order to address customer feedback and improve your offerings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A vendor that is invested in your success&lt;/strong&gt;. To quote our founder and CEO &lt;a href="https://limacharlie.io/blog/letter-from-the-limacharlie-ceo"&gt;&lt;u&gt;Maxime Lamothe-Brassard&lt;/u&gt;&lt;/a&gt;, “We are 100% a technology company and do not compete with the people and companies we provide tools and infrastructure for. We are vendor-neutral providers of tools and infrastructure for security professionals.” No other company in the cybersecurity industry today can make that claim. Because of this unique model, we are 100% invested in the success of the companies that we serve. We offer open access to our &lt;a href="https://doc.limacharlie.io/docs/documentation/4b402d5ab3edd-lima-charlie-docs"&gt;&lt;u&gt;extensive documentation&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://edu.limacharlie.io/"&gt;&lt;u&gt;education and training modules&lt;/u&gt;&lt;/a&gt;, &lt;a href="https://limacharlie.io/office-hours"&gt;&lt;u&gt;regular office hours&lt;/u&gt;&lt;/a&gt;, and a public &lt;a href="https://lcendpoint.slack.com/join/shared_invite/zt-mcgofe2r-gbgVTrJSUg5Qx7YrrDjycQ#/shared-invite/email"&gt;&lt;u&gt;community Slack channel&lt;/u&gt;&lt;/a&gt;. Startups that use LimaCharlie have access to our development and support teams as well. We believe that LimaCharlie is hands down the best platform for builders, innovators, and entrepreneurs in the cybersecurity space—so much so that we started a &lt;a href="https://limacharlie.io/blog/developer-grant-program"&gt;&lt;u&gt;Cybersecurity Infrastructure Grant program&lt;/u&gt;&lt;/a&gt;: a $1000 credit to help qualified businesses and individuals develop any project they want with LimaCharlie.&lt;/p&gt;

&lt;h2&gt;
  
  
  Taking the first step with LimaCharlie
&lt;/h2&gt;

&lt;p&gt;To learn more about how you can create a cybersecurity startup with LimaCharlie, stop by our &lt;a href="https://limacharlie.io/office-hours"&gt;&lt;u&gt;office hours&lt;/u&gt;&lt;/a&gt; this week for a chat, join our &lt;a href="https://slack.limacharlie.io/"&gt;community Slack&lt;/a&gt;, &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;&lt;u&gt;book a demo&lt;/u&gt;&lt;/a&gt;, or begin using our &lt;a href="https://app.limacharlie.io/signup"&gt;&lt;u&gt;full-featured free tier&lt;/u&gt;&lt;/a&gt; today.&lt;/p&gt;

</description>
      <category>security</category>
      <category>startup</category>
    </item>
    <item>
      <title>Cybersecurity middleware: abstraction layer for cybersecurity</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Tue, 04 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/cybersecurity-middleware-abstraction-layer-for-cybersecurity-3edc</link>
      <guid>https://dev.to/limacharlieio/cybersecurity-middleware-abstraction-layer-for-cybersecurity-3edc</guid>
      <description>&lt;h2&gt;
  
  
  The origins of cybersecurity middleware
&lt;/h2&gt;

&lt;p&gt;Almost eight years ago, Christof Jungo, who was at the time head of security architecture and engineering at Swisscom, proposed the idea of cybersecurity middleware. Christof’s idea was that although it is easy to collect all security telemetry in one place, it is difficult to operationalize it for fast and efficient incident response. He proposed a concept of interchangeable and interoperable parts that can act as a middleware, a higher-level abstraction layer for security. Jon Oltsik, a senior principal analyst at &lt;a href="https://www.esg-global.com/"&gt;&lt;u&gt;ESG&lt;/u&gt;&lt;/a&gt;, attended Christof’s presentation and wrote two fantastic pieces about it:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.csoonline.com/article/2991110/a-call-for-open-cybersecurity-middleware.html"&gt;&lt;u&gt;A call for open cybersecurity middleware&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.channele2e.com/business/talent/henry-ford-and-incident-response/"&gt;&lt;u&gt;Henry Ford and incident response&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Fast forward to 2023, and the concept of cybersecurity middleware has finally become a reality. &lt;/p&gt;

&lt;h2&gt;
  
  
  The case for cybersecurity middleware
&lt;/h2&gt;

&lt;p&gt;The easiest way to understand the concept of cybersecurity middleware is to look at the evolution of IT. &lt;/p&gt;

&lt;p&gt;About 15 years ago, IT had a large gap between developers and implementers. Most professionals in enterprise were implementers, taking the “boxed products” developed by vendors, and applying them as-is as solutions internally to their enterprise. Buyers purchased all-in-one solutions from vendors. As the IT industry grew in size and complexity, professionals also grew in maturity. More and more, professionals were expected to assemble more complex solutions from multiple parts in order to solve issues and infrastructures unique to their environment. The concept of a single vendor offering a cookie-cutter product that solves everything for everyone became laughable. IT professionals began looking for products that fit together like Lego blocks: primitives, not cookie-cutter solutions. &lt;/p&gt;

&lt;p&gt;Filling this void in the product space was AWS. It offered new unique value propositions: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Bypass internal IT: no more requests to rack-and-stack servers months ahead of time.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Bypass legacy vendors: no more negotiating complex 3-year contracts over two months. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Primitives, not boxed products: each AWS product was a “primitive”, a core implementation of the solution required, designed to plug and play with other products&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Shifting our view to cybersecurity, we can see the same shift happening. Security technologies that once were cutting-edge are now well understood by most practitioners. This is in turn driving a move away from promise-based security, where a vendor sells the promise that they are somehow the best around, to proof-based security, where a CISO has the ability to demonstrate what they are defending against. The &lt;a href="https://attack.mitre.org/"&gt;&lt;u&gt;MITRE framework&lt;/u&gt;&lt;/a&gt; took the old approach of buying many products based on marketing and flipped it on its head: figure out the threats to your business and then buy the specific products required to mitigate those threats. &lt;/p&gt;

&lt;p&gt;Like any field growing in complexity (like IT), cybersecurity is formalizing its core concepts and moving to relying more on building block solutions than on promises. Given the increasing complexity of technologies and the enterprise landscape, a similar shift to the one IT has seen is inevitable. &lt;/p&gt;

&lt;h2&gt;
  
  
  LimaCharlie’s approach to security
&lt;/h2&gt;

&lt;p&gt;LimaCharlie is a cybersecurity middleware platform that gives you full control and visibility over your security posture. As a toolkit of interoperable API-driven components, LimaCharlie can be used in a near limitless fashion depending on your specific use case. Cybersecurity middleware is not a new abbreviation of yet another security widget. Instead, it’s a way of delivering security capabilities. &lt;/p&gt;

&lt;p&gt;LimaCharlie delivers core components of security infrastructure in a manner similar to that of AWS, GCP, or any other cloud provider: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Focus on providing security capabilities instead of boxed products&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ease of access to solutions, bypassing legacy procurement processes&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Lego blocks (“primitives”) designed to work together&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Built API-first, fully transparent, interoperable, and testable components of security infrastructure&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Common fabric for integration and operationalization of security tools&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Common building blocks for new cybersecurity companies looking to get to market faster&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Over the past decade, it became clear that we cannot keep adding more and more point solutions, and hoping that it will help us future-proof our security operations. A new approach is needed, one that offers neutral security infrastructure that can be fully tailored to the individual organization’s environments. An approach similar to the one which enabled &lt;a href="https://www.channele2e.com/business/talent/henry-ford-and-incident-response/"&gt;&lt;u&gt;Henry Ford to make the Model T an affordable car for the masses&lt;/u&gt;&lt;/a&gt;, is needed to make cybersecurity more mature and more effective as a discipline. LimaCharlie is excited to be at the forefront of innovation and bring cybersecurity middleware to the industry.  &lt;/p&gt;

&lt;h2&gt;
  
  
  Getting started with LimaCharlie
&lt;/h2&gt;

&lt;p&gt;LimaCharlie’s cybersecurity middleware gives you full control and visibility over your security posture and helps you build the security program you’ve always wanted.&lt;/p&gt;

&lt;p&gt;To see for yourself how LimaCharlie can be leveraged to defend against insider threats, &lt;a href="https://app.limacharlie.io/signup"&gt;try it for free&lt;/a&gt; or &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;book a demo.&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>Defend against insider threats with LimaCharlie</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Thu, 30 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/defend-against-insider-threats-with-limacharlie-1779</link>
      <guid>https://dev.to/limacharlieio/defend-against-insider-threats-with-limacharlie-1779</guid>
      <description>&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) &lt;a href="https://www.cisa.gov/defining-insider-threats"&gt;&lt;u&gt;defines insider threat&lt;/u&gt;&lt;/a&gt; as “the potential for an insider to use their authorized access or understanding of an organization to harm that organization.”&lt;/p&gt;

&lt;p&gt;The nature of insider threats is fairly wide-ranging. Most of us in the security field will naturally think of insider threats in cybersecurity terms, but CISA’s definition includes things like espionage, terrorism, and workplace violence.&lt;/p&gt;

&lt;p&gt;CISA also notes that insider threats can sometimes be unintentional. For example, a developer who carelessly hard-codes credentials in a GitHub repository is an insider threat, even if they aren’t trying to be.&lt;/p&gt;

&lt;p&gt;In this post, we’re going to be focusing on the cybersecurity side of insider threats—but as we’ll see, it’s important to understand that insider cyber threat mitigation is part of a much larger conversation. We will also examine how LimaCharlie can be a pivotal part of that mitigation strategy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Holistic strategies, complex behaviors
&lt;/h2&gt;

&lt;p&gt;Insider threat mitigation brings some unique challenges. It’s important to realize that there won’t always be a clear technical solution to the problem of insider threats. CISA’s &lt;a href="https://www.cisa.gov/sites/default/files/publications/Insider%20Threat%20Mitigation%20Guide_Final_508.pdf"&gt;&lt;u&gt;Insider Threat Mitigation Guide&lt;/u&gt;&lt;/a&gt; stresses the importance of a holistic, all-hands approach. A comprehensive insider threat mitigation strategy accounts for elements like organizational culture, training, leadership, governance, and much more. Cybersecurity professionals need to understand that they’re part of a larger team effort, and that so-called soft skills like &lt;a href="https://ventureinsecurity.com/cybersecurity-is-not-about-technology-2819a4688574"&gt;&lt;u&gt;communication and collaboration&lt;/u&gt;&lt;/a&gt; are going to be essential.&lt;/p&gt;

&lt;p&gt;In addition, the special characteristics of insider threats mean that security teams will need to think outside the box when developing threat detections. CISA points out that “insider threat research has shown that potential insider threat perpetrators evolve over time, moving as if on a pathway, and potentially exhibiting multiple, overlapping, detectable and observable behaviors.” To prevent an insider cybersecurity incident, security teams will need to detect behaviors/clusters of behaviors that they may not be used to considering.&lt;/p&gt;

&lt;p&gt;In short, cybersecurity teams have a vital role to play in the fight against insider threats—but it’s challenging and highly skilled work. Because of our unique approach to cybersecurity, LimaCharlie is especially well-suited to insider threat mitigation tasks. &lt;/p&gt;

&lt;h2&gt;
  
  
  3 ways LimaCharlie can help defend against insider threats
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Develop sophisticated behavioral detections
&lt;/h3&gt;

&lt;p&gt;Insider threats are insidious because they come from trusted sources—and because they involve attack vectors and malicious activities that off-the-shelf EDR solutions do not sufficiently account for. &lt;/p&gt;

&lt;p&gt;As noted above, a focus on hunting for &lt;em&gt;behaviors&lt;/em&gt; is essential to detecting insider threats. In this regard, LimaCharlie’s Detection, Automation, and Response Engine is extremely helpful.&lt;/p&gt;

&lt;p&gt;The LimaCharlie EDR offers broad visibility into endpoint activity on multiple platforms—and the flexible YAML-based detection syntax means that security teams can use LimaCharlie to write highly customized detection rules. One example of how these capabilities might be applied to the problem of insider threats is to use LimaCharlie to monitor O365 logs and associated Azure data for insider threat behavior. For example, it’s possible to use LimaCharlie to monitor for insider threat events like data exfiltration and mass file deletions. For a walkthrough of how these kinds of rules are implemented, see: &lt;a href="https://www.youtube.com/watch?v=W21_CrhdVcw"&gt;&lt;u&gt;Enhance your SOC's visibility on Microsoft platforms with LimaCharlie&lt;/u&gt;&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;In terms of the bigger picture, LimaCharlie’s flexibility and customizability means you can combine different event types and parameters to build a completely tailored detection logic.  Rather than looking for the behaviors expected of a generic external adversary, LimaCharlie gives you the ability to detect against the likely behavioral profile of an insider threat in a specific industry or organization. &lt;/p&gt;

&lt;h3&gt;
  
  
  Automate alerting and response
&lt;/h3&gt;

&lt;p&gt;For security teams, another challenge in dealing with insider threats is efficiently managing alerting and response. For example, it’s important not to surface &lt;em&gt;too&lt;/em&gt; many events for priority review, because that might overwhelm personnel who are already stretched very thin.&lt;/p&gt;

&lt;p&gt;The benefit of using LimaCharlie here is that it is &lt;a href="https://limacharlie.io/blog/engineering-approach-cybersecurity"&gt;&lt;u&gt;an engineering-centric platform&lt;/u&gt;&lt;/a&gt;—which means, among other things, that it was built for cybersecurity automation. Insider threat detections can be written in an extremely fine-grained way, classifying events or combinations of events according to severity and responding to different event classes with an appropriate automated action. LimaCharlie’s integrations with no-code automation platforms like &lt;a href="https://www.tines.com/blog/cybersecurity-enhancement-limacharlie"&gt;Tines&lt;/a&gt; and &lt;a href="https://torq.io/partners/lima-charlie/"&gt;&lt;u&gt;Torq&lt;/u&gt;&lt;/a&gt; make this even easier, allowing teams to automate entire cybersecurity workflows with a few clicks. &lt;/p&gt;

&lt;p&gt;Furthermore, because LimaCharlie’s EDR sensors are able to issue commands on an endpoint, automation can also be used to respond to imminent threats instantaneously. LimaCharlie’s real-time, semi-persistent TLS connection to endpoints means that an automated response action can be taken fleetwide in around 100ms. &lt;/p&gt;

&lt;h3&gt;
  
  
  Operationalize telemetry for investigations and audits
&lt;/h3&gt;

&lt;p&gt;LimaCharlie’s numerous capabilities around telemetry data can also be used to defend against insider threats.&lt;/p&gt;

&lt;p&gt;To begin with, LimaCharlie offers users one free year of full telemetry data storage. Data is stored in a normalized and fully searchable data format. You can run detection and response (D&amp;amp;R) rules against the data using our &lt;a href="https://doc.limacharlie.io/docs/documentation/ZG9jOjE5MzExMjE-replay"&gt;&lt;u&gt;Replay&lt;/u&gt;&lt;/a&gt; feature—or easily export it to another tool for analysis. In addition, the newly released &lt;a href="https://limacharlie.io/blog/query-data-with-greater-flexibility-using-limacharlie-query-language-lcql?page=1"&gt;&lt;u&gt;LimaCharlie Query Language (LCQL) feature&lt;/u&gt;&lt;/a&gt; provides a flexible and cost-effective way to explore your stored telemetry data without ever leaving the LimaCharlie platform.&lt;/p&gt;

&lt;p&gt;In terms of insider threat mitigation, this lets security teams hunt for signs of trouble proactively. It’s important to remember CISA’s point that a malicious insider threat event is almost always preceded by a progression of worrisome behaviors that lead up to it. So using LCQL, for example, you could search for GitHub security policy violations over the past 90 days, investigating a specific user further if warranted.&lt;/p&gt;

&lt;p&gt;It’s also important to remember here that many insider threats are unintentional in nature. They’re still very serious, but in these cases the insiders aren’t setting out to do damage. Intervention and education is often the best mitigation strategy for this type of insider threat—&lt;em&gt;if&lt;/em&gt; high-risk behaviors can be identified and detected early. Because LimaCharlie offers the ability to query stored telemetry data in a highly specific way, it can be used in service of an auditing program that pinpoints specific security policy infractions over a given time frame. The resulting information can then be used to facilitate feedback and corrective training if needed.&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting started with LimaCharlie
&lt;/h2&gt;

&lt;p&gt;LimaCharlie’s high degree of customizability, extensive automation capabilities, and rich telemetry features all make it an excellent tool for security teams trying to harden organizations against insider threats.&lt;/p&gt;

&lt;p&gt;To see for yourself how LimaCharlie can be leveraged to defend against insider threats, &lt;a href="https://app.limacharlie.io/signup"&gt;&lt;u&gt;try it for free&lt;/u&gt;&lt;/a&gt; or &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;&lt;u&gt;book a demo&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How to ingest LimaCharlie output into Datadog</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Fri, 17 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/how-to-ingest-limacharlie-output-into-datadog-4ee8</link>
      <guid>https://dev.to/limacharlieio/how-to-ingest-limacharlie-output-into-datadog-4ee8</guid>
      <description>&lt;p&gt;Integrating LimaCharlie with Datadog increases visibility for LimaCharlie users. In this article, we will look at two ways you can configure the integration to help security teams streamline workflows. &lt;/p&gt;

&lt;h2&gt;
  
  
  What is Datadog?
&lt;/h2&gt;

&lt;p&gt;Datadog is a cloud-based monitoring and analytics platform that provides full-stack visibility and infrastructure management for organizations of all sizes. It integrates with various technologies, including cloud platforms, servers, databases, applications, and more, to collect and analyze data from various sources and provide real-time insights and metrics. With Datadog, organizations can monitor their entire stack and infrastructure, troubleshoot issues quickly, and optimize performance and capacity.&lt;/p&gt;

&lt;h3&gt;
  
  
  The benefits of using Datadog
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Full-Stack Visibility&lt;/strong&gt; : Datadog provides a unified view of all the components of an organization's technology stack, making it easier to identify and resolve issues.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Real-Time Insights&lt;/strong&gt; : Datadog provides real-time metrics and analytics, so users can identify and respond to issues as they arise.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Improved Collaboration&lt;/strong&gt; : Datadog's platform allows teams to work together more effectively by providing a single source of truth and enabling cross-functional collaboration.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Enhanced Troubleshooting&lt;/strong&gt; : With Datadog's monitoring and logging capabilities, users can quickly diagnose and resolve issues, reducing downtime and improving system performance.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Optimized Performance&lt;/strong&gt; : Datadog's performance metrics and analytics help users optimize their technology stack for maximum efficiency and capacity.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Compliance&lt;/strong&gt; : Datadog helps organizations meet regulatory requirements by providing comprehensive logs and alerts for auditing purposes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Integration&lt;/strong&gt; : Datadog integrates with a wide range of technologies, enabling users to seamlessly monitor their entire stack from a single platform.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Datadog + LimaCharlie
&lt;/h2&gt;

&lt;p&gt;With all relevant data in one place, integrating LimaCharlie and Datadog can help streamline the workflow for security teams giving them the ability to leverage functionalities such as pattern recognition, anomaly detection, etc.&lt;/p&gt;

&lt;p&gt;For example, anomaly detection, as an algorithmic feature, can identify when a metric is behaving differently than it has in the past, taking into account trends, seasonal day-of-week, and time-of-day patterns (stateful realm).&lt;/p&gt;

&lt;h3&gt;
  
  
  Leveraging LimaCharlie-GCP output for Datadog integration
&lt;/h3&gt;

&lt;p&gt;Datadog has comprehensive documentation on how to perform log collection - integrating Google Cloud Platform (GCP) which you can follow along here: &lt;a href="https://docs.datadoghq.com/integrations/google_cloud_platform/#log-collection"&gt;&lt;u&gt;Datadog documentation&lt;/u&gt;&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;As a direct consequence, it is natively possible for Datadog to ingest LimaCharlie telemetry when configured with the proper &lt;a href="https://doc.limacharlie.io/docs/documentation/4832b284c1cba-reference-destinations#google-cloud-storage"&gt;Google Cloud output.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;GCP gives users a lot of interesting features, but in the specific case of LimaCharlie telemetry, it is not solving an important problem: cost.&lt;/p&gt;

&lt;p&gt;De-facto, three platforms are part of what we call the "long path" to integration:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;LimaCharlie&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Google Cloud&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Datadog&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As an alternative, we are documenting a simpler way to send data in a “cloud-to-cloud” fashion, from LimaCharlie to Datadog, without the need of an additional databank—considering that both LimaCharlie and Datadog include data retention (LimaCharlie includes one year of data retention at no additional cost).&lt;/p&gt;

&lt;h3&gt;
  
  
  Integrating LimaCharlie and Datadog with GCP
&lt;/h3&gt;

&lt;p&gt;This procedure is pretty standard for those who are familiar with the Google Cloud Platform. In fact, GCP logs are collected via Stackdriver, sent to a Cloud Pub/Sub, and then to Datadog with a HTTP Push forwarder.&lt;/p&gt;

&lt;p&gt;Here's a generic way to send LimaCharlie Google Cloud outputs to Datadog:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Configure a proper output in the LimaCharlie app:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a Subscription on Google Cloud:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a Sink on Google Cloud:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Check for telemetry flowing correctly using Google Cloud Logs Explorer:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Check for telemetry flowing correctly into Datadog platform:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The LimaCharlie → GCP → Datadog integration is complete:&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Integrating LimaCharlie and DataDog directly
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Retrieve (copy) the URL containing the intake datacenter and the assigned API key from the Datadog cloud configuration tab:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use LimaCharlie webhook_bulk output for events and webhook for all the other cases:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Configure LimaCharlie output stream using (paste) the URL previously retrieved into the destination host field:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Save the new output on the LimaCharlie platform and done!&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Telemetry will be flowing from LimaCharlie to Datadog in real time in a flawless way.&lt;/p&gt;

&lt;p&gt;In the workbench we used for this test, we wanted to compare the real-time performance using both the “long” and the “short” path, and both solutions worked in a solid and smooth way with nearly zero delay between events being sent out and then represented into the several Datadog dashboards.&lt;/p&gt;

&lt;h3&gt;
  
  
  Learning more about LimaCharlie
&lt;/h3&gt;

&lt;p&gt;LimaCharlie has an active &lt;a href="https://lcendpoint.slack.com/join/shared_invite/zt-mcgofe2r-gbgVTrJSUg5Qx7YrrDjycQ#/shared-invite/email"&gt;&lt;u&gt;community Slack channel&lt;/u&gt;&lt;/a&gt; and holds &lt;a href="https://limacharlie.io/office-hours"&gt;&lt;u&gt;weekly office hours&lt;/u&gt;&lt;/a&gt; every Friday at 9:00 AM PT. These are great places to drop by and ask a question, get some help, or even request a new feature. &lt;/p&gt;

&lt;p&gt;To see the Datadog integration discussed in this post in action, &lt;a href="https://app.limacharlie.io/signup"&gt;&lt;u&gt;try LimaCharlie for free&lt;/u&gt;&lt;/a&gt; or &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;&lt;u&gt;book a demo&lt;/u&gt;&lt;/a&gt; today.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>LimaCharlie vs a traditional SIEM</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Tue, 14 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/limacharlie-vs-a-traditional-siem-1k5a</link>
      <guid>https://dev.to/limacharlieio/limacharlie-vs-a-traditional-siem-1k5a</guid>
      <description>&lt;p&gt;LimaCharlie offers many of the capabilities of a security information and event management (SIEM) solution, although it is not a SIEM. In this article, we’ll talk about LimaCharlie vs traditional SIEMs—and explain how our platform can be used to reduce or replace SIEM usage and help cybersecurity teams save money.&lt;/p&gt;

&lt;h2&gt;
  
  
  What a SIEM does vs what a SIEM is
&lt;/h2&gt;

&lt;p&gt;SIEMs handle many tasks in a modern security operations center (SOC): log management, event correlation, monitoring and alerting, data visualization, and telemetry storage. SIEMs are also useful in digital forensics work, since they retain historical log data in a unified, searchable format.&lt;/p&gt;

&lt;p&gt;In SIEM product marketing, we often see these capabilities discussed as &lt;em&gt;features&lt;/em&gt; of a SIEM. But we’d argue that there’s a different way of looking at SIEMs.&lt;/p&gt;

&lt;h2&gt;
  
  
  Features vs capabilities
&lt;/h2&gt;

&lt;p&gt;It’s sometimes useful to ask basic questions. Here, that question would be: What &lt;em&gt;is&lt;/em&gt; a feature, really?&lt;/p&gt;

&lt;p&gt;For many years, there was only one answer to this question in cybersecurity: A feature is capability delivered by some vendor’s product. &lt;/p&gt;

&lt;p&gt;But a feature and a capability aren’t the same thing, and never were. The “product feature model” has always been just one possible way of delivering capabilities to end users. &lt;/p&gt;

&lt;p&gt;LimaCharlie began with an equally fundamental question: What if there’s a better way to give cybersecurity teams the capabilities they need?&lt;/p&gt;

&lt;p&gt;Our answer is an approach that we call &lt;a href="https://limacharlie.io/blog/security-infrastructure-as-a-service"&gt;&lt;u&gt;security infrastructure as a service&lt;/u&gt;&lt;/a&gt; (SIaaS). At a high level, SIaaS makes cybersecurity capabilities directly available to end users as interoperable, cloud-native primitives. These capabilities are offered self-service, on-demand, and pay-per-use, in much the same way that AWS delivers IT capabilities and infrastructure. &lt;/p&gt;

&lt;p&gt;So to get back to what a SIEM is, we’d simply say that a SIEM is a tool that bundles together a number of useful cybersecurity capabilities. Among legacy vendors, these are presented as product features. But with an SIaaS model, security teams have access to these capabilities directly—without the downsides of traditional cybersecurity products such as unpredictable costs, multi-year contracts, and vendor lock-in. &lt;/p&gt;

&lt;p&gt;And as we’ll see, the SIaaS model makes it possible for security teams to reduce or replace usage of their existing SIEM, offering significant cost savings without sacrificing essential capabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  Three ways to use LimaCharlie for SIEM functionality
&lt;/h2&gt;

&lt;p&gt;LimaCharlie currently has a catalog of &lt;a href="https://limacharlie.io/catalog"&gt;&lt;u&gt;100+ cybersecurity capabilities and integrations&lt;/u&gt;&lt;/a&gt;. This powerful ecosystem of cybersecurity technologies makes it possible for security professionals to do things that used to require the tooling or infrastructure of a large vendor. Here are three examples of how to use LimaCharlie to get some of the most attractive benefits of a SIEM:&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Log management and data visualization
&lt;/h2&gt;

&lt;p&gt;A big benefit of SIEMs is that they help security teams collect and collate security telemetry in one place and in one view.&lt;/p&gt;

&lt;p&gt;LimaCharlie wasn’t designed to be a SIEM—but it was engineered for interoperability, automation, and customization. Because of this, the platform lets users collect telemetry from any source, normalizes everything to a unified data format, and displays it all in a single view. This includes endpoint, network, and browser telemetry data as well as log data from external sources. &lt;/p&gt;

&lt;p&gt;As a data management tool for nontechnical users, SIEMs are admittedly excellent due to their reporting capabilities. But for many security teams, report generation features or templates will rarely be of use. And it’s worth noting here that LimaCharlie already offers &lt;a href="https://limacharlie.io/blog/telemetry-storage-matters-for-cybersecurity"&gt;&lt;u&gt;one year of free telemetry storage&lt;/u&gt;&lt;/a&gt; in a fully searchable format. For many users, this may be enough, especially if they only need retention for basic compliance or for historical threat hunting.&lt;/p&gt;

&lt;p&gt;Granted, in industries where there are heavy reporting requirements, it may be impossible for security groups to avoid using a SIEM altogether. But as we’ll discuss below, there is a way to leverage the capabilities of LimaCharlie in order to greatly reduce SIEM spending.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Understanding events in context
&lt;/h2&gt;

&lt;p&gt;Another major benefit of SIEMs is that they make it easier to analyze security events in context—reducing the likelihood of false positives and improving the response to critical events.&lt;/p&gt;

&lt;p&gt;LimaCharlie’s &lt;a href="https://limacharlie.io/blog/the-limacharlie-edr"&gt;&lt;u&gt;detection, automation, and response engine&lt;/u&gt;&lt;/a&gt; allows security teams to analyze endpoint events against thousands of rules and trigger automated response actions based on the results. The platform also lets users write customized detection and response rules, and integrates with third-party threat intelligence and threat hunting platforms like AlienVault OTX, VirusTotal, MISP, and SnapAttack. This makes it possible to build highly sophisticated detection rulesets—in particular, ones that interpret the meaning of events in a wider context and support sophisticated practices like behavioral detection. &lt;/p&gt;

&lt;p&gt;To hear a conversation about how LimaCharlie can be used with third-party platforms to create complex detections, watch our webinar: &lt;a href="https://www.youtube.com/watch?v=qYxrl8tZlCk"&gt;&lt;u&gt;Power your threat detections with SnapAttack and LimaCharlie&lt;/u&gt;&lt;/a&gt;. &lt;/p&gt;

&lt;h2&gt;
  
  
  3. Automating security workflows to reduce alert fatigue
&lt;/h2&gt;

&lt;p&gt;LimaCharlie takes an &lt;a href="https://limacharlie.io/blog/engineering-approach-cybersecurity"&gt;&lt;u&gt;engineering approach to cybersecurity&lt;/u&gt;&lt;/a&gt;. That means that automation capabilities are built into the platform whenever possible, providing many SIEM-like benefits natively. For example, &lt;a href="https://limacharlie.io/blog/better-detections-with-yara-part-1?page=1"&gt;&lt;u&gt;YARA scans&lt;/u&gt;&lt;/a&gt; can be automated and run in the background across the entire fleet without impacting performance on the endpoint. The &lt;a href="https://doc.limacharlie.io/docs/documentation/0b189c00533e5-reference-events#schedule-events"&gt;&lt;u&gt;Schedule Events feature&lt;/u&gt;&lt;/a&gt; means that D&amp;amp;R rules (and just about anything else) can be set to run in an automated/scheduled way.&lt;/p&gt;

&lt;p&gt;In addition, because LimaCharlie integrates with no-code security automation platforms like &lt;a href="https://www.tines.com/"&gt;&lt;u&gt;Tines&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://torq.io/"&gt;&lt;u&gt;Torq&lt;/u&gt;&lt;/a&gt;, it’s possible to automate entire security workflows—bringing some sanity to the job of monitoring, alerting, and response in much the way that a SIEM does.&lt;/p&gt;

&lt;p&gt;For example, LimaCharlie can be used to detect suspicious events that are automatically classified into different threat levels based on predefined rules. Using a platform like Tines or Torq, teams can then choose what automated action they want taken in response to different types of threats.&lt;/p&gt;

&lt;p&gt;For more severe threats, a Slack message or PagerDuty alert might be warranted. For lower-level threats, a security team might decide to raise a ticket using an issue tracking system so that someone can follow up later.&lt;/p&gt;

&lt;p&gt;The bottom line is that security professionals gain control over what alerts cross their desks on a day-to-day basis, surfacing high-risk events so they can respond in real time without getting bogged down by less urgent events.&lt;/p&gt;

&lt;p&gt;For a full walkthrough of how this works in practice, see: &lt;a href="https://www.tines.com/blog/cybersecurity-enhancement-limacharlie"&gt;&lt;u&gt;Cybersecurity enhancement with Tines and LimaCharlie&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Intermediate use case: reduce SIEM storage costs
&lt;/h2&gt;

&lt;p&gt;As mentioned above, some users will always need access to a SIEM—and others may not be ready to move to an SIaaS alternative right away. But one of the nice things about the security infrastructure of a service model is that it gives end users a great deal of flexibility and choice. &lt;/p&gt;

&lt;p&gt;An interesting way to take advantage of this fact is to use LimaCharlie as an intermediate layer between endpoints and higher-cost tools like SIEMs, leveraging the LimaCharlie rules engine to classify, filter, and route telemetry data more intelligently.&lt;/p&gt;

&lt;p&gt;If a security group needs to have certain types of data sent to the SIEM, they can use LimaCharlie to do this by writing a rule that sends that data to, e.g., Splunk as &lt;a href="https://doc.limacharlie.io/docs/documentation/4832b284c1cba-reference-destinations"&gt;&lt;u&gt;the output destination&lt;/u&gt;&lt;/a&gt;. Everything else can be sent to a lower-cost data lake or retained using LimaCharlie’s free year of telemetry storage.&lt;/p&gt;

&lt;p&gt;In addition, we have recently rolled out &lt;a href="https://limacharlie.io/blog/query-data-with-greater-flexibility-using-limacharlie-query-language-lcql"&gt;&lt;u&gt;LimaCharlie Query Language (LCQL)&lt;/u&gt;&lt;/a&gt; as a way to further operationalize that free year of storage. LCQL allows teams to query the entirety of the dataset already stored in the LimaCharlie cloud. It offers a cost-effective way to run ad hoc queries on all of your telemetry data in one place—and thus minimizes the number of times you’ll be forced to export data to a higher-cost tool like a SIEM in order to gain the insight you need.&lt;/p&gt;

&lt;p&gt;For an in-depth demonstration of how to use LimaCharlie to cut unnecessary costs, see: &lt;a href="https://www.youtube.com/watch?v=lqPqkDkd7I8"&gt;&lt;u&gt;Reduce spending on Splunk and other high-cost security data solutions through LimaCharlie&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For an hands-on introduction to LCQL, along with some possible use cases, see: &lt;a href="https://www.youtube.com/watch?v=Yw2SNUB6xnA"&gt;&lt;u&gt;Query data with greater flexibility using LimaCharlie Query Language (LCQL)&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploring LimaCharlie for SIEM use cases
&lt;/h2&gt;

&lt;p&gt;If you’d like to get started with using LimaCharlie for SIEM functionality, &lt;a href="https://app.limacharlie.io/signup"&gt;&lt;u&gt;try LimaCharlie for free&lt;/u&gt;&lt;/a&gt; or &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;&lt;u&gt;book a demo&lt;/u&gt;&lt;/a&gt; today. &lt;/p&gt;

&lt;p&gt;To discuss a different use case, or to talk about your needs in more detail, please drop by and chat on our &lt;a href="https://lcendpoint.slack.com/join/shared_invite/zt-mcgofe2r-gbgVTrJSUg5Qx7YrrDjycQ#/shared-invite/email"&gt;&lt;u&gt;community Slack channel&lt;/u&gt;&lt;/a&gt; or during our regular &lt;a href="https://limacharlie.io/office-hours"&gt;&lt;u&gt;weekly office hours&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>MSSN CTRL: Call for papers is now open</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Thu, 09 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/mssn-ctrl-call-for-papers-is-now-open-5g02</link>
      <guid>https://dev.to/limacharlieio/mssn-ctrl-call-for-papers-is-now-open-5g02</guid>
      <description>&lt;p&gt;The inaugural &lt;a href="https://www.mssnctrl.org/"&gt;MSSN CTRL&lt;/a&gt; security engineering and automation conference will take place on October 5-6, 2023 in Arlington, VA. Get involved by submitting our &lt;a href="https://www.papercall.io/mssnctrl23"&gt;&lt;u&gt;call for proposals&lt;/u&gt;&lt;/a&gt; or &lt;a href="https://form.typeform.com/to/h64tdKlt"&gt;&lt;u&gt;get notified when registration is open.&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Over the last couple of years we’ve seen our user base grow from a core group of early adopters to now thousands of users worldwide. And with that growth comes our dedication to our community and to learn from each other. Cybersecurity is continuously evolving and security practitioners need to look to their peers for inspiration, knowledge, and ideas.&lt;/p&gt;

&lt;h3&gt;
  
  
  Community at work
&lt;/h3&gt;

&lt;p&gt;We’re creating the conference with you, the practitioner, in mind. We plan to shape the event around the cybersecurity community with workshops and discussions to give you a voice and the opportunity to share. In order to accomplish this, we need your help.&lt;/p&gt;

&lt;p&gt;Do you have a topic you want to discuss with your peers? Did you build something on top of LimaCharlie that you want to share? Topics are not limited to the use of LimaCharlie. We’re all ears. &lt;a href="https://www.papercall.io/mssnctrl23"&gt;&lt;u&gt;Submit your talk idea in our call for proposals. &lt;/u&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;b&gt;All proposals are due by April 16, 2023, at 11:59 pm PST.&lt;/b&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;All speakers will receive a professionally edited recoding of their session, professional photographs, comped ticket to the event, and the opportunity to speak at the first of many MSSN CTRL conferences.&lt;/p&gt;

&lt;p&gt;We cannot wait to create this conference with you.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>MSSN CTRL: Not just another cybersecurity conference</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Tue, 07 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/mssn-ctrl-not-just-another-cybersecurity-conference-49kk</link>
      <guid>https://dev.to/limacharlieio/mssn-ctrl-not-just-another-cybersecurity-conference-49kk</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5oVIfeQc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://images.ctfassets.net/8ypp714zy4gs/3SI3w6quGaJKrOK8YUGlQr/3d4e0ea917064f74c7556319ef1c9de1/mssnctrl__1_.png%3Fw%3D760%26fm%3Djpg%26fl%3Dprogressive%26q%3D90" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5oVIfeQc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://images.ctfassets.net/8ypp714zy4gs/3SI3w6quGaJKrOK8YUGlQr/3d4e0ea917064f74c7556319ef1c9de1/mssnctrl__1_.png%3Fw%3D760%26fm%3Djpg%26fl%3Dprogressive%26q%3D90" alt="MSSN CTRL Conference" width="760" height="456"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.mssnctrl.org/"&gt;MSSN CTRL&lt;/a&gt; is an exclusive security engineering and automation event that is focused on how innovators in cybersecurity are changing the way security has been practiced for the past decade and how they are finally able to fundamentally architect the security infrastructure they need to support what they do best.&lt;/p&gt;

&lt;p&gt;The inaugural event hosted in &lt;strong&gt;Arlington, VA on October 5-6, 2023&lt;/strong&gt; , will be filled with deep technical training and informative hands-on sessions with direct takeaways on how you can leverage new methods and tools to protect your organization or your customers. &lt;/p&gt;

&lt;p&gt;MSSN CTRL is an immersive experience that delivers the opportunity to meet with engineers, analysts, and leaders from the most prominent cybersecurity startups, security service providers, and some of the best SOC teams around the globe.&lt;/p&gt;

&lt;p&gt;We are creating this conference with you, the practitioner, in mind. Hear directly from others in the field as they share real stories of what challenges they face and how they overcome them, debrief with peers, collaborate, expand your network, and leave inspired to do security differently.&lt;/p&gt;

&lt;h3&gt;
  
  
  Topics to expect at MSSN CTRL:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Incident Response, streamlined: approaches to responding to external incidents faster and more efficiently.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The modern SOC architecture: coping with the growing diversity in IT environments.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The problem with storage: strategies to deal with storage and its operationalization.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Who should attend MSSN CTRL?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Security engineers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security architects&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security analysts&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Detection engineers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security leaders&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you are looking for new ways of thinking and new emerging technologies to solve your security problems, this is the event for you. If you have fallen victim to adding acronyms to your technology stack, we don’t blame you - but challenge you to open your mind to a new frontier.&lt;/p&gt;

&lt;h3&gt;
  
  
  Learn more about MSSN CTRL and get on the notification list
&lt;/h3&gt;

&lt;p&gt;Tickets go on sale soon. Get on the list to get notified when they are available for purchase.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.mssnctrl.org/"&gt;&amp;gt; Go to MSSN CTRL&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>Query data with greater flexibility using LimaCharlie Query Language (LCQL)</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Tue, 28 Feb 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/query-data-with-greater-flexibility-using-limacharlie-query-language-lcql-1fe0</link>
      <guid>https://dev.to/limacharlieio/query-data-with-greater-flexibility-using-limacharlie-query-language-lcql-1fe0</guid>
      <description>&lt;p&gt;If you’ve been following along our journey, you know that &lt;a href="https://limacharlie.io/blog/telemetry-storage-matters-for-cybersecurity"&gt;&lt;u&gt;LimaCharlie makes it easy and cost effective to get security data from any source&lt;/u&gt;&lt;/a&gt;, normalized into a single hub with the unique added benefit of running detection, automation, and response rules at wire speed.&lt;/p&gt;

&lt;p&gt;On top of being able to store all of your data within LimaCharlie, you get granular control and the ability to send data to any external destination. This means that you can send certain types of detections to Slack, certain types of events to Splunk, audit logs to an S3 bucket, and so on - with no lock-in and no limitations on what gets sent where. &lt;/p&gt;

&lt;p&gt;Until recently, when you wanted to query all of your data, you would need to either send it all to a third-party SIEM or request for it to be sent on-demand—storing all data in LimaCharlie and instantaneously pushing the relevant logs and events into your SIEM when you need to run an investigation.&lt;/p&gt;

&lt;p&gt;While these methods are unique and convenient, they were still limiting the ability for you to query all of your data in one place and forced you to rely on third-party tools and can be extremely cost prohibitive—limiting what you can do with your data.&lt;/p&gt;

&lt;p&gt;That’s why we are happy to introduce LimaCharlie Query Language that solves this problem. &lt;/p&gt;

&lt;h2&gt;
  
  
  What is LimaCharlie Query Language?
&lt;/h2&gt;

&lt;p&gt;LimaCharlie Query Language (LCQL) is designed to provide a flexible, intuitive, and interactive way to explore data in LimaCharlie enabling several new useful features at launch:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Dry Run mode to estimate the cost of running the query.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Paged queries, so querying for data over a long period of time is not all done at once, giving you the opportunities to get results without incurring the cost of the full query.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Querying, projection (only report specific values from matching elements) and aggregation (count, count_unique).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In future releases, we will support:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Event name and event element tab-completion. You don't have to remember the event names or paths to all the elements you want to query.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Display underlying D&amp;amp;R rules generated for the query, making it easier to use LCQL to prototype D&amp;amp;R rules.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;LCQL has been available in &lt;a href="https://www.youtube.com/watch?v=6EEB7pJ2qPg"&gt;&lt;u&gt;Beta through the LimaCharlie CLI&lt;/u&gt;&lt;/a&gt; (install the LimaCharlie CLI and use: limacharlie query to launch the interactive mode) and now the functionality is built into the LimaCharlie web application. You can get started with LCQL by navigating to the Query Console in the web app.&lt;/p&gt;

&lt;p&gt;With the introduction of LCQL, our focus is not to replace SIEM solutions, but to give you the choice and ability to query your telemetry within LimaCharlie.&lt;/p&gt;

&lt;p&gt;This feature is built on top of the Replay feature and shares the same billing structure.&lt;/p&gt;

&lt;h2&gt;
  
  
  LimaCharlie Query Language use cases
&lt;/h2&gt;

&lt;p&gt;Let’s explore some specific use cases of LCQL to help you understand the benefits and how you could potentially apply it to your organization:&lt;/p&gt;

&lt;h3&gt;
  
  
  Domain Count
&lt;/h3&gt;

&lt;p&gt;Show me all domains resolved by Windows hosts that contain "google" in the last 10 minutes and the number of times each was resolved.&lt;/p&gt;

&lt;h3&gt;
  
  
  Domains Prevalence
&lt;/h3&gt;

&lt;p&gt;Show me all domains resolved by Windows hosts that contain "google" in the last 10 minutes and the number of unique sensors that have resolved them.&lt;/p&gt;

&lt;h3&gt;
  
  
  GitHub Protected Branch Override
&lt;/h3&gt;

&lt;p&gt;Show me all the GitHub branch protection override (force pushing to repo without all approvals) in the past 12h that came from a user outside the United States, with the repo, user and number of infractions.&lt;/p&gt;

&lt;h2&gt;
  
  
  Learning more about LimaCharlie Query Language
&lt;/h2&gt;

&lt;p&gt;If you’d like to learn more about how you can use LimaCharlie Query Language to give you the ability to operationalize your historical telemetry more easily, &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;&lt;u&gt;schedule a call with our security engineers&lt;/u&gt;&lt;/a&gt; or &lt;a href="https://app.limacharlie.io/signup"&gt;&lt;u&gt;get started for free&lt;/u&gt;&lt;/a&gt; and dive into the &lt;a href="https://doc.limacharlie.io/docs/documentation/b0915c7a5f598-lima-charlie-query-language"&gt;&lt;u&gt;LCQL documentation&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;With our &lt;a href="https://limacharlie.io/pricing"&gt;&lt;u&gt;transparent pricing model&lt;/u&gt;&lt;/a&gt;, you can get predictable pricing with no long term contracts, capacity planning, or price modeling. One year of full data storage is included at no cost. &lt;/p&gt;

&lt;p&gt;You can also &lt;a href="https://youtu.be/Yw2SNUB6xnA"&gt;watch our introduction to LimaCharlie Query Language webinar&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>LimaCharlie as a low-cost way to improve cyber resilience</title>
      <dc:creator>charlton-lc</dc:creator>
      <pubDate>Thu, 23 Feb 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/limacharlieio/limacharlie-as-a-low-cost-way-to-improve-cyber-resilience-3m3</link>
      <guid>https://dev.to/limacharlieio/limacharlie-as-a-low-cost-way-to-improve-cyber-resilience-3m3</guid>
      <description>&lt;p&gt;Organizations know that they need to become more cyber resilient, and are asking MSSPs and enterprise security teams to help. But in a time of economic uncertainty and shrinking budgets, the goal of cyber resilience is often at odds with what management is prepared to invest. &lt;/p&gt;

&lt;p&gt;The good news is that LimaCharlie can be used to help security professionals improve cyber resilience—with a level of control and at a cost efficiency unparalleled industrywide. &lt;/p&gt;

&lt;h2&gt;
  
  
  The difficulty of building cyber resilient organizations
&lt;/h2&gt;

&lt;p&gt;The National Institute of Standards and Technology (NIST) defines cyber resilience as “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.”&lt;/p&gt;

&lt;p&gt;Clearly, that covers a lot of ground. Building a cyber resilient organization is a vast, all-hands undertaking—and is probably best understood as an ongoing process rather than a final state to be achieved. &lt;/p&gt;

&lt;p&gt;For security professionals, the challenge is compounded by the fact that they're frequently working with &lt;a href="https://www.forbes.com/sites/forbestechcouncil/2023/02/06/90-of-boards-are-not-ready-for-sec-cyber-regulations/"&gt;&lt;u&gt;leadership teams that have a limited grasp of cybersecurity&lt;/u&gt;&lt;/a&gt;. The ask may sound something like “just make us cyber resilient already,” without an understanding of what that entails…or how much it costs.&lt;/p&gt;

&lt;h2&gt;
  
  
  What makes LimaCharlie different
&lt;/h2&gt;

&lt;p&gt;Fortunately, LimaCharlie offers unique advantages that security teams can use to build cyber resilient organizations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;A powerful Detection, Automation, and Response Engine that supports advanced cybersecurity disciplines like detection engineering and security automation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;An engineering-centric, API-first approach to delivering security tooling and infrastructure that provides direct access to cybersecurity capabilities in the form of interoperable, cloud-native primitives in a unified data format.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;A platform that serves as versatile cybersecurity middleware, allowing cybersecurity teams to bring in telemetry from any source and output data to any destination—helping avoid vendor lock-in and optimize spending on high-cost tools. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;An on-demand, usage-based delivery and billing model: no contracts or fixed minimums; fully transparent and predictable pricing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;One year of free telemetry retention in a searchable, normalized data format, easing compliance demands and helping to cut storage costs.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  3 low-cost ways to improve cyber resilience with LimaCharlie
&lt;/h2&gt;

&lt;p&gt;To give a sense of what’s possible with these capabilities, here are a three examples of low-cost ways that LimaCharlie might be used to improve cyber resilience:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Close gaps in detection coverage and improve visibility
&lt;/h3&gt;

&lt;p&gt;A big part of cyber resilience is visibility and ease of asset management. IBM’s &lt;a href="https://www.ibm.com/resources/guides/cyber-resilient-organization-study"&gt;&lt;u&gt;Cyber Resilient Organization Study 2021&lt;/u&gt;&lt;/a&gt; found that in organizations with high levels of cyber resiliency, 65% of survey respondents said that the “ability to have visibility into applications and data assets” was a top priority for improving cyber resilience. Among organizations that had failed to improve cyber resilience, a lack of visibility into assets was one of the most commonly cited reasons for failure. For many organizations, issues of visibility are further compounded by an incomplete migration to the cloud. Cisco’s recent &lt;a href="https://www.cisco.com/c/dam/en/us/products/collateral/security/security-outcomes-vol-3-report.pdf"&gt;&lt;u&gt;Security Outcomes Report: Achieving Security Resilience&lt;/u&gt;&lt;/a&gt; found “a 15% difference in resilience scores between early hybrid cloud environments that are difficult to manage and advanced cloud deployments that are simpler to manage.” &lt;/p&gt;

&lt;p&gt;LimaCharlie’s Detection, Automation, and Response Engine has a strong detection footprint and can help to give greater visibility into assets and close gaps in coverage where they exist. We have EDR-tier sensors for Windows, Mac, Linux, &lt;a href="https://limacharlie.io/blog/endpoint-detection-and-response-on-chrome?page=1"&gt;&lt;u&gt;Chrome&lt;/u&gt;&lt;/a&gt;, and Edge, providing broad coverage in almost any environment. We also support external telemetry ingestion via the LimaCharlie Adapter, giving you access to your data streams from 1Password, CarbonBlack, Office 365, &lt;a href="https://doc.limacharlie.io/docs/documentation/73a613e8e43ed-lima-charlie-adapter"&gt;&lt;u&gt;and many more&lt;/u&gt;&lt;/a&gt;. For organizations that need help defending against &lt;a href="https://limacharlie.io/blog/cicd-pipeline-attacks"&gt;&lt;u&gt;CI/CD pipeline attacks&lt;/u&gt;&lt;/a&gt;, there is also a dedicated sensor for analyzing GitHub audit logs.&lt;/p&gt;

&lt;p&gt;All telemetry data is brought into LimaCharlie in a unified data format and in a single view—a great help in securing hybrid environments, since you can easily combine multiple data types and better manage multi-source telemetry. Telemetry data can be analyzed and responded to at wire speed using our highly customizable detection and response (D&amp;amp;R) rules engine. Pricing of sensors is extremely competitive and completely transparent (see our &lt;a href="https://limacharlie.io/pricing"&gt;&lt;u&gt;pricing guide&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://limacharlie.io/pricing-calculator"&gt;&lt;u&gt;pricing calculator&lt;/u&gt;&lt;/a&gt; for more details).&lt;/p&gt;

&lt;p&gt;For a deeper dive into this LimaCharlie use case, see our webinar: &lt;a href="https://www.youtube.com/watch?v=W21_CrhdVcw"&gt;&lt;u&gt;Enhance your SOC's visibility on Microsoft platforms with LimaCharlie&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Automate security workflows and reduce alert fatigue
&lt;/h3&gt;

&lt;p&gt;Another interesting finding of the IBM study was that the majority of highly cyber resilient organizations rely on security automation, AI, and machine learning. In a similar vein, the Cisco report found a 45% gap between the resilience scores of organizations that had made no progress toward XDR capabilities and those that had “mature XDR implementations,” which Cisco defines as XDR that incorporates automation/orchestration and threat intelligence.&lt;/p&gt;

&lt;p&gt;LimaCharlie was designed for security automation—and for teams wanting to implement advanced detection and response. In the context of cyber resilience, this is a massive advantage, because you’re starting with a platform that was purpose built to do the kinds of things that produce dramatic increases in cyber resilience. &lt;/p&gt;

&lt;p&gt;LimaCharlie also integrates with no-code security automation platforms such as &lt;a href="https://www.tines.com/"&gt;&lt;u&gt;Tines&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://torq.io/"&gt;&lt;u&gt;Torq&lt;/u&gt;&lt;/a&gt;. This extends the already robust automation capabilities of LimaCharlie, allowing teams to &lt;a href="https://www.tines.com/blog/cybersecurity-enhancement-limacharlie"&gt;&lt;u&gt;automate cybersecurity workflows&lt;/u&gt;&lt;/a&gt;, better triage events in order to reduce alert fatigue, and use the time of security personnel more efficiently and cost effectively. &lt;/p&gt;

&lt;p&gt;Last but not least, LimaCharlie offers an integration with the open-source Atomic Red Team library of tests, which makes it possible for security teams to automate security testing using the MITRE ATT&amp;amp;CK framework. This is an important benefit for cybersecurity practitioners attempting to improve organizational cyber resilience, as it enables them to understand their coverage in a systematic, &lt;a href="https://ventureinsecurity.net/p/future-of-cyber-defense-and-move"&gt;&lt;u&gt;evidence-based&lt;/u&gt;&lt;/a&gt;, and reproducible way. &lt;/p&gt;

&lt;p&gt;To learn more, see: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/playlist?list=PLO8_Yc4h5cIrPSK6ws1O0ZwydgN2gR1Bb"&gt;&lt;u&gt;Advanced Detection and Response with LimaCharlie&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=oL6D30IeZ7c"&gt;&lt;u&gt;Automating MITRE ATT&amp;amp;CK Testing w/ Atomic Red Team &amp;amp; LimaCharlie&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Respond to incidents faster and simplify remediation at scale
&lt;/h3&gt;

&lt;p&gt;Implicit in the concept of cyber resilience is an acceptance that cyber attacks &lt;em&gt;will&lt;/em&gt; happen. They can’t be avoided, it’s possible to be prepared for them—and to improve an organization’s readiness and response time.&lt;/p&gt;

&lt;p&gt;LimaCharlie offers several features that help incident response (IR) teams prepare for and respond to cyber incidents more quickly and more effectively.&lt;/p&gt;

&lt;p&gt;First, the fact that LimaCharlie is delivered on demand, self-serve, and without contracts makes it possible for IRs to come into a scenario and begin installing sensors immediately—without having to talk to salespeople or negotiate pricing. Sensors can be deployed using the LimaCharlie web interface, or by using mass deployment tools for greater efficiency.&lt;/p&gt;

&lt;p&gt;In addition, LimaCharlie’s built-in automation features help to streamline remediation tasks, especially when working at scale. Because the LimaCharlie agent can be used to execute payloads on endpoints, emergency patches can be deployed in just minutes.&lt;/p&gt;

&lt;p&gt;Lastly, LimaCharlie offers &lt;a href="https://limacharlie.io/pricing"&gt;&lt;u&gt;pure usage-based billing&lt;/u&gt;&lt;/a&gt; for teams that need it. Sensors can be deployed in sleeper mode at almost zero cost, allowing IR teams to pre-deploy sensors across a client’s fleet. In the event of an incident, the sensors are ready and waiting to be turned on—giving responders instant access to the full power of the LimaCharlie agent. From a cyber resilience standpoint, this means that an affordable rapid response capability is available to any organization that wants it. And cybersecurity companies, sleeper deployments also make it possible to offer extremely competitive service-level agreements to customers. Some IR shops that leverage LimaCharlie offer SLAs as low as 20 minutes. &lt;/p&gt;

&lt;p&gt;For an example of how one DFIR team leveraged LimaCharlie to respond to a supply chain attack—and expand their customer relationship—read our &lt;a href="https://storage.googleapis.com/lc-edu/marketing-assets/DFIR_Case_Study.pdf"&gt;&lt;u&gt;incident response case study&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Learning more
&lt;/h2&gt;

&lt;p&gt;To explore LimaCharlie’s capabilities for yourself, &lt;a href="https://app.limacharlie.io/signup"&gt;&lt;u&gt;get started for free&lt;/u&gt;&lt;/a&gt; or &lt;a href="https://info.limacharlie.io/meetings/jessica-crytzer/demo"&gt;&lt;u&gt;book a demo&lt;/u&gt;&lt;/a&gt; today. &lt;/p&gt;

&lt;p&gt;If you’d like to talk about a use case that wasn’t discussed in this post, drop us a line on our &lt;a href="https://lcendpoint.slack.com/join/shared_invite/zt-mcgofe2r-gbgVTrJSUg5Qx7YrrDjycQ#/shared-invite/email"&gt;&lt;u&gt;community Slack channel&lt;/u&gt;&lt;/a&gt; or stop by during our regular &lt;a href="https://limacharlie.io/office-hours"&gt;&lt;u&gt;weekly office hours&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
  </channel>
</rss>
