When monitoring sensitive datasets, our customers commonly ask, “What else should I be monitoring...
Author - Edward Shim
Staying Ahead of Ransomware, Part 2: Privileged Access...
What can we do to stop ransomware from happening in the first place? And how can we stay ahead of...
Staying Ahead of Ransomware, Part I: Normalcy Bias and Initial...
What one word gets any IT professional’s attention in 2021? Ransomware. In this blog series, we...
MITRE on the Mainframe, Part 1: Reconnaissance
This is Part 1 of the MITRE on the Mainframe series. For each part, we will illustrate a tactic of...
Top 5 SIEM Best Practices
Though ubiquitous in information security today, the term SIEM (security information and event...
New Privileged User Monitoring Capabilities for the Mainframe
Privileged users have access to the most sensitive areas of your mainframe environment. To keep...