Let's talk Security
Industry news, blog, videos and more
-
BlogDecember 19, 2022
IDS vs SIEM: Which Technology Offers Superior Security Performance?
The two solutions are broadly similar in scope but serve different purposes. The cybersecurity industry has no shortage of technology-...
-
BlogDecember 13, 2022
Garbage in, Garbage Out: Why Data Ingestion is Critical for SIEM Users
You can’t have high-quality log management and analysis without high-quality data. Security information and event management processes...
-
BlogDecember 12, 2022
Privileged Access Management Rule #1: Always Change Default Credentials!
(Updated December 2022) It may seem like an obvious fix, but it’s overlooked more commonly than it should be. Default credentials have...
-
BlogDecember 1, 2022
Insider Threats in Finance: How to Protect Against Undetectable Attacks
Compromised user accounts grant attackers privileges that traditional detection solutions can’t see. The traditional approach to infor...
-
BlogNovember 30, 2022
Machine Learning Presents Unique Challenges to Information Security
Machine learning is a game-changing technology, but there are limits to what it can automate. As workflows become more complex, it get...
-
BlogNovember 29, 2022
Securing the Future of Manufacturing and Industry: IT/OT Integration
Cyberattacks on utilities, industrial organizations, and critical infrastructure demonstrate the need for better security planning and ...
-
BlogNovember 22, 2022
Top InfoSec Trends for 2023: Business Priorities for Managing Security Risks
Technological advancement and economic issues will converge along several key themes. 2022 has proven to be an eventful and unpredicta...
-
BlogNovember 2, 2022
OpenSSL 3.0.7 Released: Everything You Need to Know About the High-Severity Vulnerability
OpenSSL originally warned this patch would fix a critical vulnerability impacting all OpenSSL 3.0 installations. OpenSSL has released a...
-
BlogNovember 2, 2022
OpenSSL Critical Vulnerability: Everyone Must Update to Version 3.0.7
The open-source cryptographic library is an industry-standard found in an enormous range of applications. In late October, the OpenSSL ...
-
BlogNovember 1, 2022
Improving Visibility and Preventing a Miss – Part 4: Analyze and Improve Custom Rule Performance
Custom PowerShell rules can provide unique insight into the goals and methods attackers use in their attempts. We already know that cu...
-
BlogOctober 10, 2022
People First, Automation Second: Unlock the Real Value of Your SOC
Automation is an incredibly important tool for optimizing security operations – but it’s not a cure-all for fixing broken systems and p...
-
BlogSeptember 26, 2022
Incident Response in Exabeam: How to Create Playbooks and Automate Security Incident Resolution
Learn how to use the platform’s security orchestration, automation, and response (SOAR) solution to quickly investigate and resolve sec...