The LimaCharlie Blog
November 17th, 2022
Better detections with YARA + LimaCharlie (Part 1)
Blue team defenders can use LimaCharlie's YARA capabilities to help better detect malware. This detection engineering approach is built for scale and does not impact performance on the endpoint.
November 3rd, 2022
Open source cybersecurity tools
LimaCharlie integrates with many open-source cybersecurity tools. Learn how our security infrastructure as a service approach and open-source technology is a powerful combination for security teams.
November 1st, 2022
Developer Roll Up: October 2022
LimaCharlie adds support for ingesting Crowdstrike EDR events normalized to LimaCharlie format, updated billing for Payload deployments, and the Adapter now supports a file source which has a file_path parameter to tail.
October 26th, 2022
Introducing The Cybersecurity Defenders Podcast
The Cybersecurity Defenders Podcast, a new show about cybersecurity and the people who defend the internet.
October 11th, 2022
Why telemetry storage matters for cybersecurity organizations
Telemetry storage is extremely important to cybersecurity organizations. In this post, we discuss the security and business benefits of having access to stored telemetry data.
October 6th, 2022
What makes LimaCharlie’s EDR different?
The LimaCharlie EDR is part of our unique approach to cybersecurity—which means it’s not like other EDRs. We cover the differentiators and benefits in this post.
September 30th, 2022
Developer Roll Up: September 2022
Exposing additional information about external rule sets like Sigma and Soteria, added an advanced filter capability, define suppression as part of D&R rules, extend platform and template strings.
September 22nd, 2022
Multi-Source Telemetry: Finding business email compromise
An article from the Blue Team on O365, Blue Team focusing on business email compromise (BEC).
September 15th, 2022
What is SIaaS? An introduction to security infrastructure as a service
SIaaS is an engineering approach to cybersecurity.
September 8th, 2022
Why does diversity in cybersecurity matter?
Why does diversity in cybersecurity matter? How can companies help to improve diversity and inclusion in cybersecurity?