As adversaries changed their view of an attack to include vectors across an organization, defenders have had to evolve their approach as well. This...
Hi, what are you looking for?
As adversaries changed their view of an attack to include vectors across an organization, defenders have had to evolve their approach as well. This...
As adversaries have shifted the focus of attacks to achieve their goals, defenders must evolve their approach to threat detection
Solving security's big data problem is about prioritized data flow, continuously processing data for analysis and translating and exporting it to create a single...
Extended Detection and Response (XDR) can be confusing based on so many different definitions and approaches
If we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach
There’s a gap between the promise of a security technology and operational reality
Automation can’t be just about running the process, but must include three important stages
As Security Operations Centers (SOCs) mature, they need to tackle some tough challenges with respect to data, systems and people
The Ability to Think Global, Act Local is One of the Hallmarks of a Modern Security Operations Center
How to Tackle the Data Challenge to Improve and Accelerate Detection and Response
Security Operations Centers (SOCs) Are Now Becoming Detection and Response Organizations
Collaboration is a Hallmark of Successful Security Teams
We Have the Capabilities to Persevere and Reach the Next Level of Security Maturity
Threat Intelligence is the Foundation and Lifeblood of the Security Operations Center
I’m guessing the creators of the movie The Princess Bride had no idea that Inigo Montoya’s quote – You keep using that word. I...
The concept of “The Pyramid of Pain” was first introduced by David J. Bianco in 2013. Today, most security professionals are familiar with it...
Intelligence Pivoting Allows You to Build a Broader Picture and is Pivotal to Detection and Response
Pulling the Right Data From the Right Tools Allows You to Validate a Detection and Respond Effectively
Integration is Key to Bringing Security Teams, Processes and Technology Together
The global pandemic has highlighted the importance of being prepared for the unexpected. Opportunistic attackers are taking advantage of rapidly changing work environments and...