Skip to main content
BLOG

Industry Perspectives

What Is SOAR Security and Why Should You Use It?

Security Orchestration, Automation, and Response (SOAR) is a rapidly growing field of security technology that has become increasingly popular in recent years. SOAR security enables businesses to automate their security processes in order to quickly detect, respond to, and contain threats. In this blog post, we will discuss the benefits of using SOAR security and […]

Read more

The Three Vantage Points of Effective Cybersecurity Awareness Programs

While Octobers are typically reserved for organizations like yours and mine as a time to focus on cybersecurity awareness programs, this essential work is of course a year-round effort – or, it should be! But like many of the tough challenges we all experience here in the real world, it can be very hard to […]

Read more
blog post

US Government Continues its Leadership on Cybersecurity and Ransomware

The Biden administration has distributed a memo to the private sector to mitigate the impacts of the surge in criminal attacks on US and global organizations. This response is intended to address cybercrime head-on, treating it like the national security issue it has become, and setting an example for other nations around the world.

Read more
Visualization of threat detection and response

HAFNIUM Attacks Microsoft Exchange Users

The HAFNIUM / Microsoft Exchange attack has affected at least 30,000 U.S organizations and hundreds of thousands more around the world. Integrating threat detection and response capabilities before an attack occurs can accelerate your response, limit damage, and protect your operations.

Read more

The Changing Face of Insider Threats

The traditional insider threat is evolving. Digital transformation, the chaos of our world stage and modern business environments are forcing a new view of this complex threat vector. In Part I of this series, we explore what’s changing and where things are headed.
Read more