Subscribe To Our Newsletter!

Stay up to date on the top trending threats as well as the top stories in Security, Networks, Cloud, IT Ops & AIOps.

Featured posts

Security

Clop Ransomware - KNOW how Bombardier Suffered a D...

Clop ransomware has successfully exploited a vulnerable target, and this time it was business jet maker Bombardier. Bombardier employs over 16,000 people and ...

Read More
Security

What Makes the SOC “intelligent” Part II? Assessme...

In case you missed Part I, we recently posted about improving security operations center with Intelligent SOC, starting with improving the basics (check out ...

Read More
Security

Attack Surface for Dummies Takeaways: Integrating ...

Attack surface management (ASM) and cyber threat intelligence provide protection your organization needs to defend its brands and assets. ASM offers ...

Read More
Security

What Makes the SOC “Intelligent” Part I: Detection...

Recent surveys show it costs enterprises about $3.5 million to run an effective security operations center (SOC). That’s one thing, but running an ...

Read More
Security

Leverage Modern Threat Intelligence Tools and Tech...

I wish I had this knowledge when I first started advising organizations on building their threat intelligence tools, detection and response systems. Timing was ...

Read More
Security

Right-sizing SOConomics Part III: Demonstrating Va...

For a truly intelligent approach to investing in SOC services, we need to contemplate results on two levels—Ops transformation, and alignment with the ...

Read More

Subscribe To Our Newsletter!

The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.

Thank you for subscribing!