AnnouncementCase StudyCheckmarkcustomer-story-iconData Sheethow-to-logoposts
skip to Main Content

Managed security

  • 3 min read

Here’s what you need to know about business email compromise (BEC)

How often does a business email compromise actually happen? And what should you do about it? Our infographic answers those questions and more.

  • 8 min read

The top five pitfalls to avoid when implementing SOAR

SOAR isn’t really about “orchestration and response.” It’s an engineering problem at its core. Here’s why.

  • 6 min read

How to find anomalous process relationships in threat hunting

Finding anomalous process relationships -- commands that don’t belong together -- might indicate a problem within your environment. Here’s how to spot ‘em.

  • 5 min read

This is how you should be thinking about cloud security

Your IT team isn’t racking and stacking servers like they used to, but cracking the cloud security code is easier than you think. Get our pro tips for doing just that.

  • 4 min read

Judgment, relationships and gratitude

Yep, we secured a new round of funding. Here’s a look at where we’ve been, what we’ve learned and where we’re going on this journey (and a huge “thanks” to our supporters along the way).

  • 4 min read

Don’t blow it — 5 ways to make the most of the chance to revamp your security posture

If you’ve got a blank canvas with the opportunity to build a security program from scratch, here’s how to get started and make the most of your new program

  • 4 min read

NIST’s new framework: Riding the wave of re-imagining privacy

The NIST Privacy Framework will revolutionize how we think about privacy. Here’s how your org might use it.

  • 3 min read

Four habits of highly effective security teams

Practice these habits consistently and you’ll have an engaged, talented and all-around awesome security team.

  • 4 min read

How to get your security tool chest in order when you’re growing like crazy

Need to expand your security tool chest? Our CISO’s got some tips to consider when thinking about what tech to keep or buy.

  • 4 min read

Four common infosec legal risks and how to mitigate them

There are four missteps we see happen often that open fast-growing companies up to unnecessary legal risks -- here’s how to course correct.

  • 6 min read

Dear fellow CEO: do these seven things to improve your org’s security posture

Need to get the security train back on the tracks? Our CEO’s got some pro tips on improving your org’s security ASAP.

  • 4 min read

Does your MSSP or MDR provider know how to manage your signals?

How well is your MSSP or MDR going to manage your fleet of security signals over time? Here’s how to figure out whether they’re up for the challenge.

  • 7 min read

How to build a useful (and entertaining) threat emulation exercise for AWS

Want to test your analysts’ detection skills in the cloud? Here are our tips and tricks for building your own threat emulation exercise in AWS.

  • 9 min read

12 ways to tell if your managed security provider won’t suck next year

How can you figure out if the quality of the service you’re about to sign up for will improve over time? Our COO Yanek Korff’s got some tips for making sure you choose a service that’ll last.

  • 4 min read

How public-private partnerships can support election security

Election security measures (or lack thereof) are making headlines. How can private sector orgs contribute to public sector security? Our CISO Bruce Potter’s got some ideas.

  • 9 min read

12 revealing questions to ask when evaluating an MSSP or MDR vendor

We’ve heard lots of interesting Qs as prospective customers evaluate which solution's right for them... here are the 12 you should be asking.

  • 9 min read

Seven ways to spot a business email compromise in Office 365

As attackers behind BEC attacks find ever more clever tactics to use, it’s getting trickier for businesses to protect themselves. But here are some telltale signs you can look for that are tip-offs that something’s amiss.

  • 5 min read

Reaching (all the way to) your NIST 800-171 compliance goals

Close common compliance gaps, without building a SOC, for NIST 800-171 security requirements. And a bit about how we can help.

  • 6 min read

How to get the most out of your upcoming SOC tour: making your provider uncomfortable

Seven smart ways to prepare for a tour of a security operations center (SOC) and five clues to watch out for during your visit.

resilience
  • 3 min read

How to disrupt attackers and enable defenders using resilience

So… what is resilience? We’ll cover that and also how it works in this post. We’ve even thrown in a couple examples to get you started.

  • 5 min read

Managed detection and response (MDR): symptom or solution?

An uncommonly clear review of what managed detection and response (MDR) is, where it came from and what it can/can't do for you.

  • 8 min read

Warning signs that your MSSP isn’t the right fit

Look out for these five indicators that it's probably time to start considering alternatives to your managed security services provider. Plus, questions to ask to avoid these traps.

Back To Top