Zero Trust

Man working on desktops in operations center

Leverage Your SIEM as Part of Your Zero Trust Strategy

Editor’s Note: This a partnered sponsored guest blog written by Avertium. Continuous monitoring is one of the most important facets of any Zero Trust architecture. The level of trust a system has in any user, application, or data flow may…

New Techniques to Strengthen Threat Detection and Response

5 Cybersecurity and Threat Trends CISOs Must Watch

No matter the perimeter, IT hygiene remains imperative, said James Carder, CSO at LogRhythm. If businesses were previously bad at configurations, locking systems down, managing privileges and protecting sensitive data, they’ve pushed everything to the cloud and made it internet-accessible.

Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example

Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example

Watch this on-demand webcast to learn how to make threat research an actionable part of your security operations, using recent reporting on Maze ransomware as an example.