Activated Charcoal
Making Sense of Endpoint Data Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends,…
Read More
September 6, 2016
Mitigating Risk of Cybersecurity Exploits to Medical Devices in Hospital Networks
As the need for a cost-effective patient care increases, developments and innovation in healthcare technology accelerates. Nowadays, the numerous advances in sophisticated network enabled medical devices allow increased cooperation and communication between patients, healthcare centers, and manufacturers. This direct connection…
Read More
August 30, 2016
Beyond the Sticker Price
Factors Impacting the Total Cost of Ownership of a SIEM Many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that…
Read More
August 18, 2016
Top 8 Things to Analyze in Outbound Packets
Most modern malware operates as part of a system. Whether it’s a multi-part kill chain with droppers and payloads, a botnet with command and control servers, or ransomware encrypting files, the malware on the compromised system talks to other systems…
Read More
August 16, 2016
SANS 2016 Incident Response Survey
Emerging Trends in Incident Response and Survey Results This webinar will cover the results of the third annual SANS survey on incident response. It will explore the continuing evolution of incident response, how tactics and tools have changed in the…
Read More
June 9, 2016
Discover hidden threats with User Behaviour Analytics (UBA)
As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage— and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Entity…
Read More
May 26, 2016