Skip to content

Cyber Big League

Covering All Enterprise Security
  • Enterprise Tools
    • SIEM
      • QRadar
      • Splunk
      • Microsoft Sentinel
    • EDR
    • SOAR
      • XSOAR
      • Splunk SOAR
    • Firewall
    • Vulnerability Management
    • Threat Intelligence
      • Recorded Future
  • About
  • Contact Us
  • Search

Cyber Big League

  • Search
  • Enterprise Tools
    • SIEM
      • QRadar
      • Splunk
      • Microsoft Sentinel
    • EDR
    • SOAR
      • XSOAR
      • Splunk SOAR
    • Firewall
    • Vulnerability Management
    • Threat Intelligence
      • Recorded Future
  • About
  • Contact Us
Microsoft Sentinel Pricing Explained

Pricing for Microsoft Sentinel can be challenging to understand. The information is scattered across multiple links, making getting lost in the details easy. At a high level, the pricing for Microsoft Sentinel is simple: You pay for every gigabyte ingested into and out of the Log Analytics workspace. However, there […]

Understanding Microsoft Sentinel Pricing Made Easy

mfa sign in

Muti-Factor Authentication is a necessity. We aren’t arguing against that. Quite the opposite. We highly recommend it. Today, we want to outline how malicious actors can bypass your MFA controls using relatively simple techniques. Some of these techniques can compromise your employees without anyone ever knowing. So, Is MFA enough? Let’s […]

MFA: You’re Protected, Sort Of

Splunk data model

You may have heard of data models. Maybe you haven’t. Regardless: Data models are a high-level topic that you’ll see thrown around. Sometimes, people claim them to be a utopian solution. Other times, people describe them as an incredibly complex topic. We will help you understand Splunk data models and […]

Splunk Data Models: A Necessity For Modern Cyber Security

Today, the goals of maturing Security Operations teams require modest but valuable automation. In this sense, few but impactful areas of threat hunting can be automated. One is IOC enrichment, which uses various threat intelligence provider integrations/apps within your SOAR or SIEM platforms. The second area would be taking this […]

SOAR Threat Hunting: Automate It

Recent News

  • Bank software vendor Marquis says more than 670,000 impacted by August breach
  • CISA official says agency has not seen uptick in cyber threats amid Iran war
  • Moscow seeks to limit internet to state-approved websites amid ongoing outages
  • Crypto e-commerce platform Bitrefill accuses North Korea of stealing 18,500 purchase records
  • Medusa ransomware gang claims attacks on prominent Mississippi hospital, New Jersey county

Guides

  • SIEM
  • Threat Intelligence
  • Firewall
  • EDR
  • SOAR

© 2026 Cyber Big League – All rights reserved

Powered by WP – Designed with the Customizr theme