Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for the secu… Continue reading Reducing Investigation Time: How to Quickly Parse True Positives

Empowering Employees to Reduce Security Incidents

In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security incidents. With more and more data feeds into your security analytics products, … Continue reading Empowering Employees to Reduce Security Incidents

Taming Network Chaos By Understanding User Behavior

Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable.
The post Taming Network Chaos By Understanding User Behavior appeared first … Continue reading Taming Network Chaos By Understanding User Behavior

6 Tips for Living a Healthy Digital Life and Avoiding Credential Theft This Holiday Season

Most of us still dream practical, down to earth, old fashioned dreams. And I’d place a bet that not many people, if any, dream about their credentials being stolen.  Almost all of my memories from the last 15 years or so are stored digi… Continue reading 6 Tips for Living a Healthy Digital Life and Avoiding Credential Theft This Holiday Season

Zero Trust: Why Implementation Doesn’t Have to Mean Painful Surgery On Your Network – Pt. 2

Across the conference circuit and the general cybersecurity community this year, Zero Trust – a term originally coined in 2010 – has been perhaps the industry’s hottest buzzword. Move over, blockchain and machine learning. In my … Continue reading Zero Trust: Why Implementation Doesn’t Have to Mean Painful Surgery On Your Network – Pt. 2

Hostile by definition: Thoughts on Zero Trust Security – and its pitfalls. Part 1

It’s a common question after a major breach: did you do everything you could have to protect your network? Most of the time the answer is…probably not. Often, we live in a false sense of security. We know it, and most of us are OK with it…. Continue reading Hostile by definition: Thoughts on Zero Trust Security – and its pitfalls. Part 1

Transitioning applications to the cloud doesn’t have to mean sacrificing security, visibility or control

A CISO recently told us that despite having an impressive array of cybersecurity solutions during their transition to the cloud, nothing was tying it all together from a threat standpoint. From her perspective, all the security tools at their disp… Continue reading Transitioning applications to the cloud doesn’t have to mean sacrificing security, visibility or control