Let's talk Security
Industry news, blog, videos and more
-
BlogSeptember 20, 2023
Advanced HTTP Flood Attacks Are Becoming Commonplace: Make Sure Your Organization is Prepared
Cybercriminals are now leveraging attack vectors previously only available to well-funded nation-state actors. Security professionals k...
-
BlogAugust 23, 2023
Castra Announces Partnership with Cribl to Enhance Data Visibility
Cribl Stream boosts routing capabilities for security teams using Castra, enables in-depth SIEM implementations, and reduces overhead c...
-
BlogAugust 15, 2023
AI-powered Ransomware: AI is Now a Critical Piece of Today’s Security Puzzle
As ransomware groups enhance their capabilities with generative AI and sophisticated automation, security leaders need to extend their ...
-
BlogAugust 8, 2023
Castra Again Named One of the Fastest Growing Solution Providers in the US
Castra improves its year-over-year ranking on CRN’s Annual Fast Growth 150 List for 2023.
-
BlogAugust 2, 2023
Cost-Effective Log Management: What Log Data Does Your SIEM Need?
Optimize your SIEM implementation by avoiding redundant analysis and focusing on the highest-value log data first. Deciding which logs ...
-
BlogJuly 25, 2023
Where Psychology and Security Meet: Cyberpsychology is Critical to Security Success
Good policies, excellent communication, and comprehensive training are crucial for hardening the human element of information security....
-
BlogJuly 20, 2023
Malvertising Explained: Protect Your Organization Against Malicious Ads
Malvertising can have a powerful impact on your organization, going beyond data security to influence brand reputation and more. Cyberc...
-
BlogJuly 19, 2023
Public Administration Part Two: Government Agencies Aren’t Prepared for Today’s Ransomware Variants
Ransomware threat actors are turning away from major federal organizations and focusing on small state and local-level government agenc...
-
BlogJuly 11, 2023
Custom UEBA Rules Give Public Sector Security Teams an Edge Against Data Exfiltration & Ransomware Attacks
Data exfiltration is a critical step in many ransomware attack tactics. UEBA platforms enhanced with custom rules are ideally suited to...
-
BlogJuly 6, 2023
Malicious Insiders in Healthcare: The Moment UEBA was Made For
With UEBA-powered platforms like Exabeam, you can catch threat actors who already work within your network. External threats aren’t the...
-
BlogJuly 5, 2023
How to Leverage UEBA to Address Your Organization’s Unique Risk Profile
You can make UEBA technology work right out of the box – but custom configuration is needed to unlock its real value. User Entity and B...
-
BlogJune 27, 2023
Why Aren’t Security Experts Talking About Public Administration?
Government agencies are quietly suffering a significant uptick in security incidents and data breaches – but the cybersecurity industry...