When monitoring sensitive datasets, our customers commonly ask, “What else should I be monitoring...
Author - Edward Shim
Staying Ahead of Ransomware, Part 2: Privileged Access...
What can we do to stop ransomware from happening in the first place? And how can we stay ahead of...
Staying Ahead of Ransomware, Part I: Normalcy Bias and Initial...
What one word gets any IT professional’s attention in 2021? Ransomware. In this blog series, we...
MITRE on the Mainframe, Part 1: Reconnaissance
This is Part 1 of the MITRE on the Mainframe series. For each part, we will illustrate a tactic of...
Top 5 SIEM Best Practices
Though ubiquitous in information security today, the term SIEM (security information and event...