Let's talk Security
Industry news, blog, videos and more
-
BlogMay 17, 2023
How to Spot Vendor Lock-in Before It’s Too Late
Pay close attention to a vendor’s integration capabilities, especially when it comes to competing products and providers. Migrating be...
-
BlogMay 12, 2023
Use Automation to Enhance the Value of Human Expertise in the SOC
Automation isn’t always a replacement for human expertise. The two must work together to generate lasting security value. Security Ope...
-
BlogMay 4, 2023
Is Threat Intelligence for Everyone? Our Response to Google
Translating threat insights into actionable data is an obstacle – but not an insurmountable one. In late March 2023, Google hosted a v...
-
BlogMay 2, 2023
Protect Your Security Budget Against Economic Risks with Managed Detection and Response: Part Two
Threat intelligence enables leaders to generate value through security processes and demonstrate that value to stakeholders. The first...
-
BlogApril 25, 2023
Compromised Credential Attacks Are Top Cause of Data Breaches
The use of stolen or compromised credentials remains the most common cause of a data breach. It was responsible for 19% of breaches stu...
-
BlogApril 20, 2023
Protect Your Security Budget Against Economic Risks with MDR
Security leaders are increasingly being asked to do more with less. In-house capabilities don’t scale fast enough to keep up. Business...
-
BlogApril 18, 2023
Phishing Among Top Cyber Threats Targeting Financial Services
-
BlogApril 14, 2023
A Malicious Insider Attack Poses Costly and Silent Threats to the Finance Industry
-
BlogApril 14, 2023
Custom Playbooks: Optimize Incident Response with Automated Workflows
Develop scenario-driven response frameworks that match your organization’s unique security needs. Automation gives small security team...
-
BlogApril 6, 2023
The Threat Intelligence Question: Nice-to-Have or Must-Have?
Find out how the quality of threat intelligence feeds contributes to the success of security operations. Threat intelligence plays an ...
-
BlogApril 4, 2023
Firewall Deep Dive: How Castra Uses Next-Generation Firewall Technology
Great firewall performance depends on matching the right vendor to each use case. We’ve already covered the basics of firewall technol...
-
BlogApril 1, 2023
Mobile Security in 2023: Reinforce Mobile Threat Detection with XDR
Security leaders must develop policies that accommodate mobile users expanding the attack surface. For many years, cybersecurity polic...