How to Reduce False Positives with Shared Context
False positives are rarely caused by too many alerts, but by missing context. Let’s say a spike in outbound traffic shows up in the firewall logs. Around the same time, ...
Read MoreInsights, updates, and technical deep dives from our team
False positives are rarely caused by too many alerts, but by missing context. Let’s say a spike in outbound traffic shows up in the firewall logs. Around the same time, ...
Read More
The proliferation of IoT devices across enterprise networks has fundamentally changed the security and operational landscape for NetOps and
Read More
The retail landscape has evolved dramatically over the past decade. What once was a straightforward network connecting point-of-sale systems
Read MoreIn a recent article on Dark Reading, it was revealed that millions of IoT devices were exposed to a
Read More
It’s that time of year again. Employees have gone away from the office to spend time with friends and
Read More
Recently, there has been an increase in distributed denial-of-service (DDoS) attacks that involve the use of compromised IoT devices
Read More
Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier
Read More
The Internet of Things (IoT) describes the wide array of devices (beyond traditional computers and mobile phones) that are
Read More
With billions of devices coming online yearly, the world of IoT (Internet of Things) is upon us. Unfortunately, like
Read More
Last week at the Cyber Security Summit in Denver, I participated in a panel that answered questions being asked
Read MoreIt turns out, we were right; we just were looking at the wrong toys. In a recent article on
Read More