An emerging data architecture, data lakehouses sure sound nicer than both data warehouses and data lakes — that’s because data lakehouses are nicer to use.
Cyber resilience is like a superhero cape: you won’t be invincible, but you will be stronger against the bad guys. Get all the details here — no cape required.
Supply chain attacks are like Jenga, except instead of removing blocks, you're removing security measures. Instead of the tower falling, your company does.
Aggregating log data shouldn’t be difficult! (Thanks, technology.) Learn why you need it & how to do it right — log data can inform all parts of your business.
Analyzing behaviors has a lot of use cases. In this article, we are hyper-focused on using BA for the cybersecurity of your enterprise. Learn all about BA here.
Oh no, a critical incident has just happened. Chaos everywhere, but who is in charge? The Incident Commander, of course. Get all the details on the IC role here.
How do you gather intelligence about the bad actors trying to infiltrate your systems? Cyber counterintelligence offers defensive and offensive approaches.
In this blog post, we'll take a look at common event format (CEF) s a standard for the interoperability of event- or log generating devices and applications.
Don’t be confused, be creative. Observability is a lot more than mere monitoring. In fact, the possibilities are practically endless. Find out more here.
A major security incident happens: you need to minimize the impact and restore normality ASAP. The best way to do it? The CSIRT. Get all the details about this team.
Every 19 seconds a ransomware attack launches. Are these standalone attacks? Are they operating within a ransomware family of shared knowledge? Find out here.
A crucial part of cryptography and cybersecurity, key management is how you share secret key knowledge that enables secure communications over the network.
Hunting threats, detecting threats. Sounds the same — but they are not! Get tons of info (+ free resources) for prevention methods that underpin cybersecurity.