Blog

Lights, Case, Action!

LogRhythm released Case Management in its most recent update, and while I could wax lyrical about the merits of why you should be using this...

Read More

Sharing Threat Intelligence

After the breach of Sony Pictures by North Korea, legislative attention has come back to cybersecurity. Its primary goal has been the sharing of threat...

Read More

Detecting DNS Tunneling

All kind of different services, like web browsing, email, active directory, etc., use the Domain Name System (DNS) protocol to turn IP addresses into human...

Read More