Let's talk Security
Industry news, blog, videos and more
-
BlogSeptember 1, 2022
Log4Shell Update: New Indicators of Compromise & Long-term Predictions
The Log4Shell vulnerability is likely to continue impacting systems for the foreseeable future. Log4Shell (CVE-2021-44228) was origina...
-
BlogAugust 31, 2022
SOAR and XDR: Buzzword or Buzz-Worthy Security Tech?
Discover the differences between these two security technologies, and the important ways they complement one another. Enterprise infor...
-
BlogAugust 30, 2022
How to Reduce the Risk of Serious Cyberattack Damage: System Hardening
Hardened systems are much more difficult to compromise and offer reduced rewards for attackers who succeed. Not all cyberattacks resul...
-
BlogAugust 24, 2022
Reducing the Risk of Serious Attacks: Risk Management
Adopting a risk management perspective helps security leaders make good decisions when faced with uncertain environments and unknown th...
-
BlogAugust 23, 2022
Keep Your Digital Footprint in Step with Your Information Security Needs
Every online action you perform involves sharing a bit of data – over time, that data can add up. Successful organizations and influen...
-
BlogAugust 17, 2022
Palo Alto Networks PAN-OS Vulnerability: What Users Need to Know
The flaw has been exploited in real-world attacks, but most Palo Alto customers will remain unaffected. In the second week of August, ...
-
BlogAugust 17, 2022
Risk Management for CISOs: Own Your Information Security Program
The CISO’s job is a leadership role that includes setting clear expectations and knowing how to meet them.
-
NewsAugust 15, 2022
Castra Named One of North America’s Fastest-Growing Solutions Providers
CRN places Castra on its annual Fast Growth 150 list for 2022 Durham, North Carolina — August 2022 — CRN has included Castra in its ann...
-
BlogAugust 4, 2022
How to Create a Ransomware-Ready Disaster Recovery Plan
Data disasters come in all shapes and forms, and enterprises need to have multi-layered contingencies in place. A good enterprise disa...
-
BlogAugust 3, 2022
Not All Attacks Are Preventable: Early Detection and Response is Crucial
Develop a multi-layered security posture that minimizes the damage attackers can cause. Cybersecurity technologies traditionally fall ...
-
BlogAugust 2, 2022
Four Ways Security Automation Can Improve Your Detection and Response Capabilities
Use modern automation tools to identify and mitigate attack risks more efficiently than otherwise possible. Cybercriminals are increas...
-
BlogJuly 28, 2022
How to Access and View Event Logs Using Exabeam in Linux
Examining event and endpoint logs is the first step towards building comprehensive customized rulesets. Many information security lead...