If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to carry
Choose a Category
It’s fall here on the east coast of the US and that means a few things. First is that the weather and leaves start changing
Endpoint agents and logs often play an important role in securing your organization. That said, despite the investment of millions into endpoint agents, IDS/IPS, and
We’ve seen the best-of-breed or single-vendor platform debate unfold for many years. On one hand, you have niche solutions providing a focused approach to cybersecurity.
Increasingly complex cyber threats are pushing SOC analysts to ‘up their game’. It has become critical to quickly understand how an attacker has gained access, what