Tips & Tricks

Incident Response Orchestration with LogRhythm 7

When it comes to cyber threats, you already understand how pertinent mitigation is. However, many organizations struggle with inefficient or effective remediation solutions. Preventive technologies...

Read More

Clear Text Passwords (Caught!) Use Case

The Challenge Having clear text credentials on your corporate network can make your organization vulnerable. Detecting them early and notifying the users, as well as...

Read More

NetMon and SSL Proxy Integration

The Encryption Paradox Security experts universally agree that network traffic must be encrypted to be considered secure, and many compliance standards and applications (let alone...

Read More

Make Your Data Work for You

“Make your money work for you.” It’s something that I’ve heard financial planners say for years. But recently, I started correlating this notion with what...

Read More