Abstract
Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Videos

Breaking the SIEM Mold: Security Data Operations & What’s Next | Live at Black Hat

Learn More
C2 Corner

Startup Partnerships: Lessons from the Front Lines

Learn More
Product

Shift-Left Detections with Abstract

Learn More
C2 Corner

Inside the Web of Scattered Spider: DFIR Lessons and the Future of Modern Detection

Learn More
Product

How Juul Labs Rebuilt Its Security Operations Using Abstract

Learn More
C2 Corner

10 Cybersecurity Focus Areas That Actually Move the Needle

Learn More
Security

Automating macOS Incident Response: DFIR-as-Code in Action Against AppleProcessHub

Learn More
Product

Introducing Abstract LakeVilla: Pipeline-Powered, Analyst Ready, and Efficient Storage

Learn More
C2 Corner

C2 Corner: Achieving Fortune 50 Security With a SMB Budget

Learn More
Security

Uncovering Compromised Git Admins: How to Detect actors like theCom

Learn More
C2 Corner

Thinking Beyond the Budget: Why Your Security Team Isn’t a Cost Center

Learn More
Security

DFIR-as-Code: Scaled and Repeatable Incident Response

Learn More
C2 Corner

Trust and Community: The Peer-to-Peer Security Advantage

Learn More
C2 Corner

Redefining the SOC: Why AI Elevates (Not Replaces) the Next Generation of Analysts

Learn More
C2 Corner

Introducing C2 Corner: By Practitioners, For the Industry

Learn More
News

Abstract Security Named in SACR’s 2025 SDPP Market Guide: The Rise of Security Data Pipelines

Learn More
SIEM

The Invisible Enemy: Unmasking Microsoft 365’s Logging Blind Spots

Learn More
Product

Strengthening Integrations in the Abstract Security Platform

Learn More

Subscribe to our
newsletter

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.