AnnouncementCase StudyCheckmarkcustomer-story-iconData Sheethow-to-logoposts
skip to Main Content

Tips

  • 4 min read

Four common infosec legal risks and how to mitigate them

There are four missteps we see happen often that open fast-growing companies up to unnecessary legal risks -- here’s how to course correct.

  • 6 min read

Dear fellow CEO: do these seven things to improve your org’s security posture

Need to get the security train back on the tracks? Our CEO’s got some pro tips on improving your org’s security ASAP.

  • 6 min read

Five tips for improving your data ingestion and auditing process

You’re processing loads of data every day...but are you catching it all? Here are tips from our pros for rocking your data auditing.

  • 4 min read

How public-private partnerships can support election security

Election security measures (or lack thereof) are making headlines. How can private sector orgs contribute to public sector security? Our CISO Bruce Potter’s got some ideas.

  • 8 min read

How to find Amazon S3 bucket misconfigurations and fix them ASAP

Why do Amazon S3 bucket breaches happen and how can you protect your own org from making this mistake? We’ve got all the AWS pro tips for you in our latest post.

  • 6 min read

Evaluating GreyNoise: what you need to know and how it can help you

We use technologies behind the scenes to make Expel Workbench and our analysts more efficient. GreyNoise is one of those -- here's how we use it and why you might find it useful too.

  • 9 min read

12 revealing questions to ask when evaluating an MSSP or MDR vendor

We’ve heard lots of interesting Qs as prospective customers evaluate which solution's right for them... here are the 12 you should be asking.

  • 9 min read

Seven ways to spot a business email compromise in Office 365

As attackers behind BEC attacks find ever more clever tactics to use, it’s getting trickier for businesses to protect themselves. But here are some telltale signs you can look for that are tip-offs that something’s amiss.

  • 8 min read

Why we love threat emulation exercises (and how to get started with one of your own)

If your team doesn’t have lots of incident response practice under their belt (yet!), a threat emulation exercise is the perfect way to help them flex those response muscles and improve your collective skills.

  • 6 min read

How to get the most out of your upcoming SOC tour: making your provider uncomfortable

Seven smart ways to prepare for a tour of a security operations center (SOC) and five clues to watch out for during your visit.

  • 2 min read

Oh Noes! A new approach to IR tabletop exercises

Oh Noes! is a role-playing game designed to help you and your organization become better prepared to respond to cybersecurity incidents.

  • 4 min read

Five quick checks to prevent attackers from weaponizing your website

Here are some of the most frequent ways attackers can use your website and your web presence to harm your company, your users and the public at large.

  • 5 min read

How to hunt for reconnaissance

Use the hunting process to find attackers performing reconnaissance, through actions that aren’t things most users typically do, in your system.

Darktrace investigation
  • 10 min read

Investigating Darktrace alerts for lateral movement

Dive into a typical investigation and see how our analysts triage a Darktrace alert. Plus! We share some of our favorite Darktrace features.

resilience
  • 3 min read

How to disrupt attackers and enable defenders using resilience

So… what is resilience? We’ll cover that and also how it works in this post. We’ve even thrown in a couple examples to get you started.

  • 1 min read

Heads up: WPA2 vulnerability

A (very) quick overview of the reported WPA2 weakness.

  • 9 min read

From webshell weak signals to meaningful alert in four steps

Walk through a practical example of how you can make a weak signal actionable by combining events from your endpoint and network security technologies into one meaningful alert.

  • 8 min read

How to triage Windows endpoints by asking the right questions

The three parts of the investigative mindset and how to apply them when you triage endpoint alerts.

  • 6 min read

A cheat sheet for managing your next security incident

Tactical advice on how to survive a security incident when you don’t have an incident response plan.

Back To Top