If you’ve got a blank canvas with the opportunity to build a security program from scratch, here’s how to get started and make the most of your new program
The NIST Privacy Framework will revolutionize how we think about privacy. Here’s how your org might use it.
Practice these habits consistently and you’ll have an engaged, talented and all-around awesome security team.
Need to expand your security tool chest? Our CISO’s got some tips to consider when thinking about what tech to keep or buy.
There are four missteps we see happen often that open fast-growing companies up to unnecessary legal risks -- here’s how to course correct.
Need to get the security train back on the tracks? Our CEO’s got some pro tips on improving your org’s security ASAP.
How well is your MSSP or MDR going to manage your fleet of security signals over time? Here’s how to figure out whether they’re up for the challenge.
Want to test your analysts’ detection skills in the cloud? Here are our tips and tricks for building your own threat emulation exercise in AWS.
How can you figure out if the quality of the service you’re about to sign up for will improve over time? Our COO Yanek Korff’s got some tips for making sure you choose a service that’ll last.
Election security measures (or lack thereof) are making headlines. How can private sector orgs contribute to public sector security? Our CISO Bruce Potter’s got some ideas.
We’ve heard lots of interesting Qs as prospective customers evaluate which solution's right for them... here are the 12 you should be asking.
As attackers behind BEC attacks find ever more clever tactics to use, it’s getting trickier for businesses to protect themselves. But here are some telltale signs you can look for that are tip-offs that something’s amiss.
Close common compliance gaps, without building a SOC, for NIST 800-171 security requirements. And a bit about how we can help.
Seven smart ways to prepare for a tour of a security operations center (SOC) and five clues to watch out for during your visit.
So… what is resilience? We’ll cover that and also how it works in this post. We’ve even thrown in a couple examples to get you started.
An uncommonly clear review of what managed detection and response (MDR) is, where it came from and what it can/can't do for you.
Look out for these five indicators that it's probably time to start considering alternatives to your managed security services provider. Plus, questions to ask to avoid these traps.