“The world is your oyster!” “The sky’s the limit!” Those may sound like encouraging words, but according to ‘millennial therapist’ Tess Brighman the biggest...
Hi, what are you looking for?
“The world is your oyster!” “The sky’s the limit!” Those may sound like encouraging words, but according to ‘millennial therapist’ Tess Brighman the biggest...
This may be cheesy, and half of you reading this may not have been alive at the time to remember, but President Ronald Reagan’s...
I’ve talked before about how we have the tools and technologies to make the intelligent SOC a reality. It’s a welcomed development given the...
External factors, including security tools shifting to the cloud, the rise of Endpoint Detection and Response (EDR) solutions, and the cybersecurity talent shortage, are...
Remember when we used to believe we could prevent every attack? We focused on prevention, layering defenses so that if one layer failed another...
The NCAA Tournament ended just a few days ago and the pain or exuberance, depending on your bracket picks, is still fresh. As I...
From Ferdinand Magellan to Lewis and Clark to Neil Armstrong – humans have an innate desire to understand the unknown. In security operations, we...
With Context to Understand and Prioritize Security Data and Alerts You Can Stay Focused on What Matters Most
Demonstrating Effective Communication is a Foundation for Effective Security Operations
It’s that time of year for prediction articles and the number has become almost overwhelming. This year, one of the trending topics I’ve noticed...
Most Organizations Have More Intelligence Than They Know What to do With..
A quick Google search reveals instances of false positives happening every day. A signal from NASA’s Opportunity rover that remained unresponsive for months after...