Latest Insights

Blog

The Deficiency of Mean Time Metrics in Cybersecurity

Jerry Heinz, Head of Engineering, walks through some of the shortcomings of mean time metrics to understand how considering SNR as well will serve your SOC better.
The Deficiency of Mean Time Metrics in Cybersecurity
Blog

Scale Your Security Operation by Focusing on SOCe

In this post, Jennifer Mitchell, Head of Operations, offers some insights on the various ways we’ve achieved SOC efficiency, and how some of our techniques may generalize to your own operation.
Scale Your Security Operation by Focusing on SOCe
Blog

Three Key Attributes for Achieving Meaning in Cybersecurity

There are three core things necessary for IT leaders to create a persistent, sustainable, and exceptional security program for their organization. Check out this blog for insights.
Three Key Attributes for Achieving Meaning in Cybersecurity
Blog

Protect your supply chain from attacks like Kaseya Ransomware

In this blog, we use the most recent Kaseya VSA attack as an example of a supply chain attack and use it as an illustration of why supply chain attacks require special security considerations as well as offer guidelines as to how to protect against these attacks.
Protect your supply chain from attacks like Kaseya Ransomware
Blog

Using Data Science and Automation to Combat Alert Fatigue

It’s no secret that midsize enterprises are struggling with the overwhelming demands of modern cybersecurity. In this blog, we dive into using data science and automation to combat alert fatigue.
Using Data Science and Automation to Combat Alert Fatigue
Blog

Why You Should Think Like A Hacker

The attacker vs defender mindset must be pervasive in the design, implementation and testing of every security technology for it to be successful.
Why You Should Think Like A Hacker
Blog

Optimal Security Alerts: Specific, Relevant, Actionable, Scalable

We explain why not all alerts are created equal, and what makes for an informative and actionable alert.
Optimal Security Alerts: Specific, Relevant, Actionable, Scalable
Blog

Threat Modeling: A Guide for Small to Midsize Enterprises

In this blog post, we describe the tangible effect security controls should yield - practices enabling risk reduction; and introduce some Threat Modeling frameworks that you can draw upon.
Threat Modeling: A Guide for Small to Midsize Enterprises
Blog

4 Ways to Stop Ransomware on the Endpoint

vCISO, Adam Mansour, breaks down how we stop ransomware on your operating systems with our agent.
4 Ways to Stop Ransomware on the Endpoint
Blog

Four Criteria for a Successful Security Portal

In this blog post, we discuss the advantages a well-developed security dashboard can empart to developing organizations and IT teams.
Four Criteria for a Successful Security Portal
Blog

Despite the Hype, EDR Alone Won’t Save You

Adam Mansour describes EDR, including reasons it’s insufficient on its own to protect your business.
Despite the Hype, EDR Alone Won’t Save You
Blog

6 SOC2 Questions to Ask Your Security Provider

There are many criteria IT leaders consider when assessing their security providers...
6 SOC2 Questions to Ask Your Security Provider
Blog

Virtual Roundtable: Cybersecurity Essentials for the New Normal

In partnership with the IT Media Group, we brought together 12 cross-industry IT executives for a virtual roundtable. The session provided an opportunity to focus on the top cybersecurity issues that organizations face.
Virtual Roundtable: Cybersecurity Essentials for the New Normal
Blog

How Data Science Can Save You From a Heuristics Headache

We explain why simple heuristics will pale in comparison to what a proper data science-fueled machine learning algorithm can do.
How Data Science Can Save You From a Heuristics Headache
Blog

Why Securing Against IT Supply Chain Attacks is Crucial

In this post, we separate the IT or software supply chain from the traditional supply chain - as both are targeted separately, and there are different means to mitigate such risks.
Why Securing Against IT Supply Chain Attacks is Crucial
123