Let's talk Security
Industry news, blog, videos and more
Cost-Effective Log Management: What Log Data Does Your SIEM Need?
Optimize your SIEM implementation by avoiding redundant analysis and focusing on the highest-value log data first. Deciding which logs ...
BlogJune 22, 2023
Threat Intelligence + MDR: Be Prepared for the Next MOVEit Attack
Every network has hidden vulnerabilities. Curated threat intelligence data and scalable expertise let organizations find these vulnerab...
BlogJune 20, 2023
Top 5 Takeaways from Verizon’s 2023 Data Breach Report
Cybercriminals are adopting new, more sophisticated tactics. Security leaders can’t depend on purely technical solutions that ignore th...
NewsJune 14, 2023
Castra Managed Services Renews SOC 2 Type II Attestation
Independent audit verifies the security, availability, integrity, confidentiality, and privacy of Castra processes and controls. Durham...
BlogMay 17, 2023
How to Spot Vendor Lock-in Before It’s Too Late
Pay close attention to a vendor’s integration capabilities, especially when it comes to competing products and providers. Migrating bet...
BlogMay 12, 2023
Use Automation to Enhance the Value of Human Expertise in the SOC
Automation isn’t always a replacement for human expertise. The two must work together to generate lasting security value. Security Oper...
BlogMay 4, 2023
Is Threat Intelligence for Everyone? Our Response to Google
Translating threat insights into actionable data is an obstacle – but not an insurmountable one. In late March 2023, Google hosted a vi...
BlogMay 2, 2023
Protect Your Security Budget Against Economic Risks with Managed Detection and Response: Part Two
Threat intelligence enables leaders to generate value through security processes and demonstrate that value to stakeholders. The first ...
BlogApril 25, 2023
Compromised Credential Attacks Are Top Cause of Data Breaches
The use of stolen or compromised credentials remains the most common cause of a data breach. It was responsible for 19% of breaches stu...
BlogApril 20, 2023
Protect Your Security Budget Against Economic Risks with MDR
Security leaders are increasingly being asked to do more with less. In-house capabilities don’t scale fast enough to keep up. Business ...
BlogApril 18, 2023
Phishing Among Top Cyber Threats Targeting Financial Services
BlogApril 14, 2023
A Malicious Insider Attack Poses Costly and Silent Threats to the Finance Industry
BlogApril 14, 2023
Custom Playbooks: Optimize Incident Response with Automated Workflows
Develop scenario-driven response frameworks that match your organization’s unique security needs. Automation gives small security teams...