Latest Insights

Blog

Why Automated Response Is Critical in Stopping Threats Before They Spread

Mean Time to X (Detect, Alert, Respond) or MTTX metrics are frequently chosen when people want to determine a response system's ability to respond to an attack. This system will consist of tooling and people. Read more for insights.
Why Automated Response Is Critical in Stopping Threats Before They Spread
Blog

Top 3 Takeaways from ActZero’s Fireside Chat on Cybersecurity Essentials

How can you ensure you’re stopping threats effectively? How can you build your security environment to succeed? Check out our blog for insights.
Top 3 Takeaways from ActZero’s Fireside Chat on Cybersecurity Essentials
Blog

Why Darktrace Installs a Hooli Box

Sure, there’s artistry in beautiful interfaces and snappy visuals. But aren’t they just vain and self-indulgent when you don’t need them to get the job done? Read more for insights into the idea behind the box.
Why Darktrace Installs a Hooli Box
Blog

Why You Need Incident Response Fire Drills

Just like in case of fire, you need to practice incident response (IR) scenarios, so you know what to do in the event of an active breach. Here’s our guideline for planning out your next IR fire drill.
Why You Need Incident Response Fire Drills
Blog

The 5 Most Gruesome Cyber Threats

We gathered our security experts and had them rank some of today’s scariest and spookiest cyberthreats. Here’s their countdown of the top 5 frighteners.
The 5 Most Gruesome Cyber Threats
Blog

A Smarter Way to Detect Suspicious Cloud Logins

Perry Spector, Data Scientist at ActZero, explains how using more precise features — customized to every user account — results in better detections and fewer false positives.
A Smarter Way to Detect Suspicious Cloud Logins
Blog

Top 5 Data Breaches and How to Prevent Them

Companies large and small need to talk about the threat posed by data breaches. We look at the five most common attack types and steps to mitigate the risk.
Top 5 Data Breaches and How to Prevent Them
Blog

The Deficiency of Mean Time Metrics in Cybersecurity

Jerry Heinz, Head of Engineering, walks through some of the shortcomings of mean time metrics to understand how considering SNR as well will serve your SOC better.
The Deficiency of Mean Time Metrics in Cybersecurity
Blog

Scale Your Security Operation by Focusing on SOCe

In this post, Jennifer Mitchell, Head of Operations, offers some insights on the various ways we’ve achieved SOC efficiency, and how some of our techniques may generalize to your own operation.
Scale Your Security Operation by Focusing on SOCe
Blog

Three Key Attributes for Achieving Meaning in Cybersecurity

There are three core things necessary for IT leaders to create a persistent, sustainable, and exceptional security program for their organization. Check out this blog for insights.
Three Key Attributes for Achieving Meaning in Cybersecurity
Blog

Protect your supply chain from attacks like Kaseya Ransomware

In this blog, we use the most recent Kaseya VSA attack as an example of a supply chain attack and use it as an illustration of why supply chain attacks require special security considerations as well as offer guidelines as to how to protect against these attacks.
Protect your supply chain from attacks like Kaseya Ransomware
Blog

Using Data Science and Automation to Combat Alert Fatigue

It’s no secret that midsize enterprises are struggling with the overwhelming demands of modern cybersecurity. In this blog, we dive into using data science and automation to combat alert fatigue.
Using Data Science and Automation to Combat Alert Fatigue
Blog

Why You Should Think Like A Hacker

The attacker vs defender mindset must be pervasive in the design, implementation and testing of every security technology for it to be successful.
Why You Should Think Like A Hacker
Blog

Optimal Security Alerts: Specific, Relevant, Actionable, Scalable

We explain why not all alerts are created equal, and what makes for an informative and actionable alert.
Optimal Security Alerts: Specific, Relevant, Actionable, Scalable
Blog

Threat Modeling: A Guide for Small to Midsize Enterprises

In this blog post, we describe the tangible effect security controls should yield - practices enabling risk reduction; and introduce some Threat Modeling frameworks that you can draw upon.
Threat Modeling: A Guide for Small to Midsize Enterprises
123