Zero Trust

Here’s What Zero Trust Really Means

Zero trust functions on the main principle that everything is a threat that must be verified before gaining access to anything in your company’s databases. Watch this on-demand webinar to learn about zero trust and how to quickly implement your strategy!

Woman in glasses looking at computer screen

SOC Modernization: Building a Strong Foundation

Editor’s Note: This a partnered sponsored guest blog written by Cadre. The core paradigm of today’s security operation center (SOC) is having the right tools paired with the right technologies and using automation to make sense of the mountain of…

Man working on desktops in operations center

Leverage Your SIEM as Part of Your Zero Trust Strategy

Editor’s Note: This a partnered sponsored guest blog written by Avertium. Continuous monitoring is one of the most important facets of any Zero Trust architecture. The level of trust a system has in any user, application, or data flow may…

New Techniques to Strengthen Threat Detection and Response

Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example

Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example

Watch this on-demand webcast to learn how to make threat research an actionable part of your security operations, using recent reporting on Maze ransomware as an example.