Blog

Thought Leadership

Our experts share with you.

See All Articles

Not all Threats are Cyber Part Two

Last week, I mentioned the assassination of a Chinese shipping executive who was killed in his car while parked near an upscale market in Karachi,...

Posted on March 08, 2018
Sep 13

4 Crucial Steps to Getting the Best Value out of Your SIEM

Maximize Your SIEM

It is fairly common knowledge among security professionals that security information and event management (SIEM) technologies are complex systems. No matter the vendor or the system, SIEMs require hard work and dedication to ensure they are running at their maximum capabilities and providing the most benefit to the organization.

read more →
Oct 05

Getting better at logs

Summary:

read more →
Aug 24

Adaptive Monitoring

Monitoring and detection is your primary line of defense. Firewalls, Next Gen X, IDS/IPS/HIDS and so on, are important components of defense, but monitoring and detection tie these all together. If you want to do the most you can to protect the keys of the kingdom, you need to have a solid program and plan put in place.

read more →