Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures …
The post … Continue reading Understanding how attackers move inside your organization

Crank Up your Sensors with the Respond Analyst, an XDR Engine

The XDR Engine, the Respond Analyst, we announced last week is the first XDR product to meet companies where they are in their security operations journey, designed with efficiency and ease of implementation in mind….
The post Crank Up your Sensors w… Continue reading Crank Up your Sensors with the Respond Analyst, an XDR Engine

An Effective SOC Begins with a Mindset Overhaul

Even with the deepest pockets, there are still not enough people to keep pace with demands of today’s Security Operations Center (SOC). The volume of relevant security data and the number of analysts available to…
The post An Effective SOC Begins wit… Continue reading An Effective SOC Begins with a Mindset Overhaul

Setting the Foundation for a Cyber Resilient Future: Q&A with Peter Schawacker of Blinktag Solutions

We recently sat down with Peter Schawacker, a leading consultant with in-demand expertise in both the business and technical domains of cybersecurity. With over two decades of experience in nearly every aspect of the field,…
The post Setting the Foun… Continue reading Setting the Foundation for a Cyber Resilient Future: Q&A with Peter Schawacker of Blinktag Solutions

Cybersecurity Lessons from the Pandemic: Data – Part 2

Having discussed issues relating to the collection and reporting of COVID-19 data in Part 1, we now turn to cyberspace, even though the jury is still out regarding much of the pandemic data. Equivalent situations to those described with respect to the … Continue reading Cybersecurity Lessons from the Pandemic: Data – Part 2

3 Reasons Why You Might Consider Managed SIEM

Small and mid-size enterprises (SMEs) leverage an array of security technologies to protect the organization from the latest threats. But, the cost and complexity in managing these technologies as well as the amount of data generated from these de… Continue reading 3 Reasons Why You Might Consider Managed SIEM

Avoid these Failures with SIEM Tools at All Costs

SIEM is a powerful security tool when deployed successfully. But, gathering insights and achieving the benefits of using a SIEM tool can be a challenge and many organizations fail to do so. Unfortunately, if you’re not maximizing the value o… Continue reading Avoid these Failures with SIEM Tools at All Costs

Ask These Questions When Evaluating SIEM Solutions

Modern IT infrastructure generates a wealth of data. A large or mid-size enterprise can generate petabytes and, in some cases, even exabytes of log and metadata. Hackers know this and intentionally target organizations that are sitting on data gol… Continue reading Ask These Questions When Evaluating SIEM Solutions