Let's talk Security
Industry news, blog, videos and more
Information Security ABCs for Education Leaders
Information security solutions for the education sector should include several must-have features. Schools, universities, and other ed...
BlogDecember 19, 2022
IDS vs SIEM: Which Technology Offers Superior Security Performance?
The two solutions are broadly similar in scope but serve different purposes. The cybersecurity industry has no shortage of technology-...
BlogDecember 13, 2022
Garbage in, Garbage Out: Why Data Ingestion is Critical for SIEM Users
You can’t have high-quality log management and analysis without high-quality data. Security information and event management processes...
BlogDecember 12, 2022
Privileged Access Management Rule #1: Always Change Default Credentials!
(Updated December 2022) It may seem like an obvious fix, but it’s overlooked more commonly than it should be. Default credentials have...
BlogDecember 1, 2022
Insider Threats in Finance: How to Protect Against Undetectable Attacks
Compromised user accounts grant attackers privileges that traditional detection solutions can’t see. The traditional approach to infor...
BlogNovember 30, 2022
Machine Learning Presents Unique Challenges to Information Security
Machine learning is a game-changing technology, but there are limits to what it can automate. As workflows become more complex, it get...
BlogNovember 29, 2022
Securing the Future of Manufacturing and Industry: IT/OT Integration
Cyberattacks on utilities, industrial organizations, and critical infrastructure demonstrate the need for better security planning and ...
BlogNovember 22, 2022
Top InfoSec Trends for 2023: Business Priorities for Managing Security Risks
Technological advancement and economic issues will converge along several key themes. 2022 has proven to be an eventful and unpredicta...
BlogNovember 2, 2022
OpenSSL 3.0.7 Released: Everything You Need to Know About the High-Severity Vulnerability
OpenSSL originally warned this patch would fix a critical vulnerability impacting all OpenSSL 3.0 installations. OpenSSL has released a...
BlogNovember 2, 2022
OpenSSL Critical Vulnerability: Everyone Must Update to Version 3.0.7
The open-source cryptographic library is an industry-standard found in an enormous range of applications. In late October, the OpenSSL ...
BlogNovember 1, 2022
Improving Visibility and Preventing a Miss – Part 4: Analyze and Improve Custom Rule Performance
Custom PowerShell rules can provide unique insight into the goals and methods attackers use in their attempts. We already know that cu...
BlogOctober 10, 2022
People First, Automation Second: Unlock the Real Value of Your SOC
Automation is an incredibly important tool for optimizing security operations – but it’s not a cure-all for fixing broken systems and p...
BlogSeptember 26, 2022
Incident Response in Exabeam: How to Create Playbooks and Automate Security Incident Resolution
Learn how to use the platform’s security orchestration, automation, and response (SOAR) solution to quickly investigate and resolve sec...