Our “Applying Network-Centric Approaches for Threat Detection and Response” Paper Publishes

After many discussions and a bit of a re-write, our new paper “Applying Network-Centric Approaches for Threat Detection and Response” is finally ready (Gartner GTP access required). The abstract states “The escalating sophistication o… Continue reading Our “Applying Network-Centric Approaches for Threat Detection and Response” Paper Publishes

Our Updated “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” (2019) Publishes

Esteemed Mr Barros has beat me to it this time, but here is my re-re-announcement of our updated “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” (2019) deception paper. Some of my favorite quotes fo… Continue reading Our Updated “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” (2019) Publishes

Webinar Q&A from Modern Network Threat Detection and Response

As promised, here is my lightly edited Q&A from a recent webinar called “Modern Network Threat Detection and Response.” Questions about vendors are removed, and some are edited for clarity. Q: I thought “vendor C” has a devi… Continue reading Webinar Q&A from Modern Network Threat Detection and Response

Our “Solution Path for Implementing Threat Detection and Incident Response” Publishes

As you can see below, we have written a lot of research over the years, and it would be handy to have a roadmap for the readers. This is especially useful for organizations that are in the phase of “OMG WHAT TO DO WITH ALL THIS CYBER?” phas… Continue reading Our “Solution Path for Implementing Threat Detection and Incident Response” Publishes