Platform
Threat Detection Marketplace
Your Home for Threat Detection
Attack Detective
Industry-First SaaS for Advanced Threat Hunting
Uncoder AI
Single IDE for Detection Engineering
DetectFlow
Data pipeline for routing detections
Ecosystem
Use Cases
Fortify SIEM Posture
Audit your SIEM posture to maximize threat visibility & address detection coverage gaps.
Obtain Rules for Alerting
Get prioritized SIEM use cases ready-to-deploy as low-noise and high-value alerts.
Advance Threat Detection
Access the world’s largest rule feed for emerging threats, manage & deploy detections at scale.
Elevate Detection Engineering
Save time and costs, obtain CTI-enriched use cases, adapt CI/CD workflows.
Accelerate MDR Services
Reduce customer churn, address technical debt in threat detection, and save on SIEM costs.
Hyperscale SIEM Migration
Accelerate time-to-value and maximize the ROI of your SIEM migration project.
Services
Professional Services Overview
Explore our on-demand services and training.
MITRE ATT&CK Audit
Minimize blind spots and ensure comprehensive data visibility.
Custom Content Engineering
Adopt out-of-the-box detection engineering capability to identify threats challenging your business.
SIEM Migration Services
Accelerate time-to-value and maximize the ROI of your SIEM migration project.
Resources
Blog
Research, guides, interviews
Events
Stay tuned to our cybersecurity events
Data Sheets
Explore our data sheets for detailed insights
Active Threats
Get detection code and simulations
Customer Success Stories
Learn how global organizations trust SOC Prime
Detection as Code
Explore our latest innovation reports
Roota
Open-Source Language for Collective Cyber Defence
Sigma
History of Sigma Evolution
Industry Expertise
Center of Excellence for Microsoft Sentinel
Center of Excellence for Amazon Web Services
Splunk Migration & Support
Tools
Uncoder.IO
The Prime Hunt browser extension:
Chrome
Firefox
Edge
Company
Why SOC Prime?
Collective cyber defense for a secure tomorrow
About Us
Our story and mission
Industry Recognition
Verified value for cybersecurity
Leadership
Biography and DNA
Careers
Job opportunities at SOC Prime
Privacy
SOC Prime’s privacy-centric mindset
SOC 2 Type II Compliance
Benchmark for security compliance
Partner Programs for Universities
Sigma & MITRE ATT&CK® Education
Log In
View intelligence
View intelligence
View intelligence
←
Back to Blog
Tag: Observability
Mar 25/2026
15 min de lectura
SIEM y EDR
Pipeline de telemetría: cómo funciona y por qué es importante en 2026
by Steven Edwards
Mar 18/2026
10 min de lectura
SIEM y EDR
Canal de Observabilidad: Gestión de Telemetría a Gran Escala
by Steven Edwards
Search:
Follow us on:
Archive
abril 2026 (1)
marzo 2026 (9)
febrero 2026 (9)
enero 2026 (10)
diciembre 2025 (8)
noviembre 2025 (7)
octubre 2025 (17)
septiembre 2025 (11)
agosto 2025 (9)
julio 2025 (13)
junio 2025 (28)
mayo 2025 (20)
abril 2025 (36)
marzo 2025 (13)
febrero 2025 (15)
enero 2025 (16)
diciembre 2024 (24)
noviembre 2024 (12)
octubre 2024 (16)
septiembre 2024 (12)
agosto 2024 (12)
julio 2024 (16)
junio 2024 (14)
mayo 2024 (12)
abril 2024 (16)
marzo 2024 (9)
febrero 2024 (12)
enero 2024 (10)
diciembre 2023 (11)
noviembre 2023 (12)
octubre 2023 (12)
septiembre 2023 (15)
agosto 2023 (9)
julio 2023 (13)
junio 2023 (14)
mayo 2023 (13)
abril 2023 (8)
marzo 2023 (10)
febrero 2023 (12)
enero 2023 (11)
diciembre 2022 (9)
noviembre 2022 (8)
octubre 2022 (9)
septiembre 2022 (25)
agosto 2022 (26)
julio 2022 (28)
junio 2022 (29)
mayo 2022 (33)
abril 2022 (35)
marzo 2022 (33)
febrero 2022 (11)
enero 2022 (7)
diciembre 2021 (6)
noviembre 2021 (7)
octubre 2021 (11)
septiembre 2021 (3)
agosto 2021 (3)
julio 2021 (7)
junio 2021 (9)
mayo 2021 (10)
abril 2021 (12)
marzo 2021 (8)
febrero 2021 (10)
enero 2021 (15)
diciembre 2020 (10)
noviembre 2020 (2)
octubre 2020 (8)
septiembre 2020 (15)
agosto 2020 (20)
julio 2020 (26)
junio 2020 (22)
mayo 2020 (28)
abril 2020 (12)
marzo 2020 (4)
enero 2020 (2)
diciembre 2019 (1)
noviembre 2019 (1)
octubre 2019 (3)
septiembre 2019 (1)
agosto 2019 (1)
julio 2019 (2)
junio 2019 (1)
mayo 2019 (1)
octubre 2018 (1)
agosto 2018 (1)
febrero 2018 (1)
noviembre 2017 (5)
octubre 2017 (8)
septiembre 2017 (1)
agosto 2017 (5)
julio 2017 (5)
mayo 2017 (1)
diciembre 2016 (2)
julio 2016 (1)
mayo 2016 (2)
marzo 2016 (3)
febrero 2016 (1)
enero 2016 (1)
diciembre 2015 (3)
noviembre 2015 (3)
Tags
Adam Swan
AI
AI SOC Ecosystem
AI-generated Decision Tree
Apache Kafka
APT
APT28
APT44
ArcSight
Ariel Millahuel
Arunkumar Krishna
Authentication Bypass
AWS
AWS WAF
Aytek Aytemur
Botnet
Cactus Ransomware
CCM
CERT-UA
CERTUA
China Chopper
Chinese APT Actors
Chronicle UDM
CI/CD
CISA
CISA Alert
Community
Correlation
CTI
CVE
CVE-2025-21298
CVE-2025-31324
CVE-2025-8088
CVE-2026-21509
Cyber-espionage
Cyberattack
cyberwar
DarkCrystal RAT
DARKCRYSTALRAT
Davut Selcuk
DDoS
Den Iuzvyk
DetectFlow
Detection Content
Elastic
Elasticsearch
Elevation of Privileges
ELKStack
Emanuele De Lucia
Emir Erdogan
Events
Exploit
False positive
Fancy Bear
FIN7
Full Summary
Furkan Celik
Gamaredon
GenAI
Generative AI
Google Chrome
Google Chrome Vulnerability
Google SecOps
Halil Ibrahim Cosgun
How to
Infostealer
Integration
Interview
Investigation
IOC
IOC Rule
Kafka
Kimsuky
KQL
Kusto
Kyaw Pyiyt Htet
Latest threats
Lazarus
Lee Archinal
LLM
LockBit
Log Management
MaaS
macOS
Malware
Microsoft Defender for Endpoint
Microsoft Sentinel
Microsoft Vulnerability
Microsoft Zero-Day
MITRE ATT&CK
Mustafa Gurkan KARAKAYA
Mustang Panda
Nattatorn Chuensangarun
Observability
Onur Atali
OpenSearch
Osman Demir
Phishing
PlugX
Privilage Escalation
privilege escalation
QRadar
RaaS
RansomHub
Ransomware
RAT
RCE
Roman Ranskyi
RomCom
Roota
Rule Digest
Rule of the Week
Rules
russianagression
Sandworm
SDPP
Seashell Blizzard
Secret Blizzard
Security Data Pipeline Platform
SentinelOne detection
Shift-Left Threat Detection
SIEM
SIEM & EDR
Sigma
Sittikorn
Sittikorn Sangrattanapitak
SmokeLoader
SOC Prime
SOC Prime Platform
SOC Prime Team
SOC Prime Team Stories
SolarWinds
Splunk
Splunk SPL
Sreeman Shanker
Supply Chain Attack
TDM
The Prime Hunt
Threat Bounty Program
Threat Detection Marketplace
Threat Hunting
Threat Hunting Content
Threat Intelligence
Threatintel
ThreatIntelligence
TopCVE2023
Turla
Uncoder
Uncoder AI
Uncoder CTI
Use Case
Vulnerability
WAF
Wirapong Petshagun
Zero-click
Zero-Day
ZeroDay