Let's talk Security
Industry news, blog, videos and more
-
BlogJanuary 30, 2023
EDR and XDR – Which is the Best Solution for Your Business?
Both technologies provide endpoint protection, but with different levels of sophistication. For years, endpoint detection and respons...
-
BlogJanuary 30, 2023
Introducing the Threat Intelligence Tools Cybercriminals Fear Most
Cybercriminals tend to be opportunists. Implementing the right cyber threat intelligence tools can dramatically shift the security land...
-
BlogJanuary 26, 2023
Managed Detection & Response is a Team Effort: Know Your Responsibilities
Operational security excellence requires partnership, communication, and oversight from vendors and clients alike. The automatic minds...
-
BlogJanuary 20, 2023
Cyberattacks on Banks: 5 Growing Threats in 2023
Cyberattacks against banks and financial institutions continue to rise as cybercriminals develop new tactics. The global financial sec...
-
BlogJanuary 18, 2023
How to Implement a Proactive Cybersecurity Strategy in the Banking Industry
Security leaders at financial institutions need to look beyond digital transformation and plan to meet tomorrow’s risks. IT leaders in...
-
BlogJanuary 17, 2023
Prioritizing Data Privacy in 2023: How to Mitigate Compromised Credential Risks
The more connected the world becomes, the greater the demand for visibility into data privacy becomes. More than two-thirds of America...
-
BlogJanuary 11, 2023
How Finance Leaders Can Move Beyond Banking Cybersecurity Regulations
Cybercriminals don’t follow regulations, and simply checking boxes isn’t enough to guarantee sustainable security outcomes. It’s easy f...
-
BlogDecember 19, 2022
IDS vs SIEM: Which Technology Offers Superior Security Performance?
The two solutions are broadly similar in scope but serve different purposes. The cybersecurity industry has no shortage of technology-...
-
BlogDecember 13, 2022
Garbage in, Garbage Out: Why Data Ingestion is Critical for SIEM Users
You can’t have high-quality log management and analysis without high-quality data. Security information and event management processes...
-
BlogDecember 12, 2022
Privileged Access Management Rule #1: Always Change Default Credentials!
(Updated December 2022) It may seem like an obvious fix, but it’s overlooked more commonly than it should be. Default credentials have...
-
BlogDecember 1, 2022
Insider Threats in Finance: How to Protect Against Undetectable Attacks
Compromised user accounts grant attackers privileges that traditional detection solutions can’t see. The traditional approach to infor...
-
BlogNovember 30, 2022
Machine Learning Presents Unique Challenges to Information Security
Machine learning is a game-changing technology, but there are limits to what it can automate. As workflows become more complex, it get...