To understand cybersecurity, we use a simple formula to explain how a company stays safe:
In this lesson, we focus on D (Detection)—the art of seeing the intruder.
Security teams use two main types of software to "see" hackers:
Think of SIEM as a Big Library. It collects the "diaries" (logs) of every computer in the company and stores them in one place to find suspicious patterns.
Think of XDR as a "Go Fish" Search. Instead of collecting everything first, it stays on the devices. When a threat is suspected, it asks all computers at once: "Do you see this specific hacker?"
Key Difference: SIEM pulls data up to a database; XDR pushes searches down to the devices.
Hackers are often like ninjas—they can stay hidden in a network for an average of 200 days before an automated alarm goes off!
Threat Hunting is when security experts don't wait for the computer to beep. They use:
By "Hunting," we catch bad guys early, rather than waiting months for a tool to find them.
The "Control Room" or "War Room" where security analysts sit and watch monitors for signs of an attack.
Any device at the "end" of the line, such as your laptop, a smartphone, or a company server.
Anything that is "not normal." For example, if an employee who usually works in New York suddenly logs in from a different country at 3:00 AM.
A digital record or "diary" of everything a computer does. Security tools read these to find clues.
Click any answer to reveal the truth!