Latest Insights

Blog

Predictions vs Process: Why "How" Trumps "What"

Chris Finan explains why cybersecurity predictions are most valuable when they are practically applicable. He covers our rigorous process for developing and measuring such predictions.
Predictions vs Process: Why "How" Trumps "What"
Blog

log4shell: Patch Necessary, but Insufficient - Proactive Steps Required

In this post, we take you through the steps we took to go beyond patching and discuss measures you can take to protect your software supply chain more generally, and evaluate them in the context of this threat.
log4shell: Patch Necessary, but Insufficient - Proactive Steps Required
Blog

Collaboration is Requisite in Cybersecurity

IT leaders need to be thinking about how to engage top-tier expertise across the full spectrum of prevention and response activities to stay ahead of modern threats. Read more for insights.
Collaboration is Requisite in Cybersecurity
Blog

Why Automated Response Is Critical in Stopping Threats Before They Spread

Mean Time to X (Detect, Alert, Respond) or MTTX metrics are frequently chosen when people want to determine a response system's ability to respond to an attack. This system will consist of tooling and people. Read more for insights.
Why Automated Response Is Critical in Stopping Threats Before They Spread
Blog

Top 3 Takeaways from ActZero’s Fireside Chat on Cybersecurity Essentials

How can you ensure you’re stopping threats effectively? How can you build your security environment to succeed? Check out our blog for insights.
Top 3 Takeaways from ActZero’s Fireside Chat on Cybersecurity Essentials
Blog

Why Darktrace Installs a Hooli Box

Sure, there’s artistry in beautiful interfaces and snappy visuals. But aren’t they just vain and self-indulgent when you don’t need them to get the job done? Read more for insights into the idea behind the box.
Why Darktrace Installs a Hooli Box
Blog

Why You Need Incident Response Fire Drills

Just like in case of fire, you need to practice incident response (IR) scenarios, so you know what to do in the event of an active breach. Here’s our guideline for planning out your next IR fire drill.
Why You Need Incident Response Fire Drills
Blog

The 5 Most Gruesome Cyber Threats

We gathered our security experts and had them rank some of today’s scariest and spookiest cyberthreats. Here’s their countdown of the top 5 frighteners.
The 5 Most Gruesome Cyber Threats
Blog

A Smarter Way to Detect Suspicious Cloud Logins

Perry Spector, Data Scientist at ActZero, explains how using more precise features — customized to every user account — results in better detections and fewer false positives.
A Smarter Way to Detect Suspicious Cloud Logins
Blog

Top 5 Data Breaches and How to Prevent Them

Companies large and small need to talk about the threat posed by data breaches. We look at the five most common attack types and steps to mitigate the risk.
Top 5 Data Breaches and How to Prevent Them
Blog

The Deficiency of Mean Time Metrics in Cybersecurity

Jerry Heinz, Head of Engineering, walks through some of the shortcomings of mean time metrics to understand how considering SNR as well will serve your SOC better.
The Deficiency of Mean Time Metrics in Cybersecurity
Blog

Scale Your Security Operation by Focusing on SOCe

In this post, Jennifer Mitchell, Head of Operations, offers some insights on the various ways we’ve achieved SOC efficiency, and how some of our techniques may generalize to your own operation.
Scale Your Security Operation by Focusing on SOCe
Blog

Three Key Attributes for Achieving Meaning in Cybersecurity

There are three core things necessary for IT leaders to create a persistent, sustainable, and exceptional security program for their organization. Check out this blog for insights.
Three Key Attributes for Achieving Meaning in Cybersecurity
Blog

Protect your supply chain from attacks like Kaseya Ransomware

In this blog, we use the most recent Kaseya VSA attack as an example of a supply chain attack and use it as an illustration of why supply chain attacks require special security considerations as well as offer guidelines as to how to protect against these attacks.
Protect your supply chain from attacks like Kaseya Ransomware
Blog

Using Data Science and Automation to Combat Alert Fatigue

It’s no secret that midsize enterprises are struggling with the overwhelming demands of modern cybersecurity. In this blog, we dive into using data science and automation to combat alert fatigue.
Using Data Science and Automation to Combat Alert Fatigue
123