External factors, including security tools shifting to the cloud, the rise of Endpoint Detection and Response (EDR) solutions, and the cybersecurity talent shortage, are...
Hi, what are you looking for?
External factors, including security tools shifting to the cloud, the rise of Endpoint Detection and Response (EDR) solutions, and the cybersecurity talent shortage, are...
Remember when we used to believe we could prevent every attack? We focused on prevention, layering defenses so that if one layer failed another...
The NCAA Tournament ended just a few days ago and the pain or exuberance, depending on your bracket picks, is still fresh. As I...
From Ferdinand Magellan to Lewis and Clark to Neil Armstrong – humans have an innate desire to understand the unknown. In security operations, we...
With Context to Understand and Prioritize Security Data and Alerts You Can Stay Focused on What Matters Most
Demonstrating Effective Communication is a Foundation for Effective Security Operations
It’s that time of year for prediction articles and the number has become almost overwhelming. This year, one of the trending topics I’ve noticed...
Most Organizations Have More Intelligence Than They Know What to do With..
A quick Google search reveals instances of false positives happening every day. A signal from NASA’s Opportunity rover that remained unresponsive for months after...
Adversaries are Increasingly Masterful at Taking Advantage of Seams Between Technologies and Teams to Infiltrate Organizations
As voters prepare to go to the polls in a couple of weeks, it's crucially important that they have information needed to make decisions...
Many CISOs I speak with are growing weary of searching for the next “silver bullet” security technology or another threat feed to improve their...