Correlating Network and Host Activity for Full Traffic Attribution
Monitoring your network traffic can help you detect the first signs of misuse or a potential intrusion. But the identity of the user and program behind a potential issue may still be a mystery. To uncover those details and get…
Read More
November 27, 2018
An Overview to Threat Hunting: 7 Common Hunts to Get Started
In the world of cybersecurity, you don’t just “go threat hunting.” You need to have a target in mind. You need to look in the right places, and have the right tools at your disposal. In this free training session,…
Read More
November 20, 2018
Building a Cybersecurity Architecture to Combat Today’s Risks
The rapid development and adoption of cloud infrastructure, mobile workforces, the Internet of Things (IoT), and other susceptible environments have mandated a reappraisal of security architecture. Modern organizations are recognizing their security posture may not be keeping up with the…
Read More
October 29, 2018
Defending the Enterprise Using Open-Source Security Tools
One of the common complaints security professionals tend to share is, “I don’t have the budget for that.” But did you know that many of the tools that can solve security problems in your enterprise are free? You don’t have…
Read More
October 5, 2018
Integrating IAM Solutions with SIEM
Security teams are overwhelmed with a high volume of user accounts. That’s why they’re turning to Identity Access Management (IAM) solutions for help. IAM should go beyond enabling consistent identity and Single Sign On (SSO) and instead seamlessly integrate with…
Read More
September 17, 2018
No Single Definition of a SOC: The SANS 2018 Survey Part 1
While security operation centers (SOCs) are maturing, staffing and retention issues continue to plague critical SOC support functions. Watch this on-demand webinar to learn how respondents to the SANS 2018 SOC survey are staffing their SOCs. You’ll discover the value…
Read More
September 4, 2018