IT Security | August 27, 2018Simplifying security auditing, Part 3: Keeping insider threats in check Insider threats are on the rise. In fact, both administrators and average employees are...
IT Security | August 15, 2018Simplifying security auditing, Part 1: Regularly reviewing server activity Everyone knows about the importance of log management in IT security. Yet, organizations...
IT Security | May 17, 2018Free webinar on setting up critical security alerts in your environment Every security team relies on security alerts as indicators of compromise (IOCs)....