Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for the secu… Continue reading Reducing Investigation Time: How to Quickly Parse True Positives

What’s New in 3.1? New Dashboard, Exciting Integrations, and A Free Product!

Preempt is happy to release version 3.1, available today! Included in the release are a brand new security assessment dashboard, exciting features offering more visibility and better password and network security, new technology partners and produ… Continue reading What’s New in 3.1? New Dashboard, Exciting Integrations, and A Free Product!

Taming Network Chaos By Understanding User Behavior

Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable.
The post Taming Network Chaos By Understanding User Behavior appeared first … Continue reading Taming Network Chaos By Understanding User Behavior

A CISO’s perspective: Solving a 20-year cyber security problem

My partner Jay Leek and I have decades of experiences as CISOs and have spoken with hundreds of security companies.  It’s rare that we get truly excited about a new security technology. Preempt sparked that sense of excitement in both of us. … Continue reading A CISO’s perspective: Solving a 20-year cyber security problem

We’ve raised $27.5 million: How Preempt’s funding validates Identity and Access Threat Prevention

Preempt began with a basic premise: Effective security within an enterprise should combine threat detection and real time response within a single solution. As enterprises transition to the cloud and the perimeter disappears, identity is the new p… Continue reading We’ve raised $27.5 million: How Preempt’s funding validates Identity and Access Threat Prevention

How to Strengthen Your Cyber Security DNA

Cyber security is a complex animal that requires many disciplines and a diverse toolkit. Typically, resources are limited, and incident response and security staff are overloaded with noise, irrelevant alerts and incomplete static information. &#1… Continue reading How to Strengthen Your Cyber Security DNA

Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

I’ve heard it many times from customers: “IT Security needs to be transparent to users in order to be successful.” Unfortunately, we are now in a digital age where things have dramatically changed and research has shown over and … Continue reading Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior