Let's talk Security
Industry news, blog, videos and more
-
BlogJune 22, 2023
Threat Intelligence + MDR: Be Prepared for the Next MOVEit Attack
Every network has hidden vulnerabilities. Curated threat intelligence data and scalable expertise let organizations find these vulnerab...
-
BlogJune 20, 2023
Top 5 Takeaways from Verizon’s 2023 Data Breach Report
Cybercriminals are adopting new, more sophisticated tactics. Security leaders can’t depend on purely technical solutions that ignore th...
-
NewsJune 14, 2023
Castra Managed Services Renews SOC 2 Type II Attestation
Independent audit verifies the security, availability, integrity, confidentiality, and privacy of Castra processes and controls. Durham...
-
BlogMay 17, 2023
How to Spot Vendor Lock-in Before It’s Too Late
Pay close attention to a vendor’s integration capabilities, especially when it comes to competing products and providers. Migrating bet...
-
BlogMay 12, 2023
Use Automation to Enhance the Value of Human Expertise in the SOC
Automation isn’t always a replacement for human expertise. The two must work together to generate lasting security value. Security Oper...
-
BlogMay 4, 2023
Is Threat Intelligence for Everyone? Our Response to Google
Translating threat insights into actionable data is an obstacle – but not an insurmountable one. In late March 2023, Google hosted a vi...
-
BlogMay 2, 2023
Protect Your Security Budget Against Economic Risks with Managed Detection and Response: Part Two
Threat intelligence enables leaders to generate value through security processes and demonstrate that value to stakeholders. The first ...
-
BlogApril 25, 2023
Compromised Credential Attacks Are Top Cause of Data Breaches
The use of stolen or compromised credentials remains the most common cause of a data breach. It was responsible for 19% of breaches stu...
-
BlogApril 20, 2023
Protect Your Security Budget Against Economic Risks with MDR
Security leaders are increasingly being asked to do more with less. In-house capabilities don’t scale fast enough to keep up. Business ...
-
BlogApril 18, 2023
Phishing Among Top Cyber Threats Targeting Financial Services
-
BlogApril 14, 2023
A Malicious Insider Attack Poses Costly and Silent Threats to the Finance Industry
-
BlogApril 14, 2023
Custom Playbooks: Optimize Incident Response with Automated Workflows
Develop scenario-driven response frameworks that match your organization’s unique security needs. Automation gives small security teams...