Tech bulletin

How to choose a deception vendor

When shopping around for cybersecurity vendors, it can be hard to distinguish and determine which vendor is right for your organization. This is especially true with deception, a sector that is still...

Netwrix reduces the time to detect and investigate incidents involving sensitive data

Netwrix announced the release of Netwrix Auditor X. An important milestone in the product’s fifteen-year history, the new version is dedicated to helping organizations around the world become safer...

Improving collaboration during investigation with Logpoint 6.10

Logpoint 6.10 makes it easier for analysts to collaborate on and share the latest security information while providing more details during investigation.

How to Combat Alert Fatigue With Cloud-Based SIEM Tools

Today’s security teams are facing more complexity than ever before. IT environments are changing and expanding rapidly, resulting in proliferating data as organizations adopt more tools to stay on...

How Effective is Threat Hunting for Organizations?

In recent years, threat hunting has become much more widely adopted, but today the definition of threat hunting is still quite a controversial topic. Threat hunting is the art of finding the unknown...

What is Threat Intelligence and why is it important?

Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be...

Insider threat in times of COVID-19

During COVID-19 employees within various organizations started to work from home more and more. Organizations see the advantages this brings in relation to the productivity. The downside of this...

Logpoint’s guide to the MITRE ATT&CK framework

Tactics are the core of the ATT&CK framework and represent the “why” of an ATT&CK technique. It is the adversary’s tactical objective: the reason for performing an action. Tactics group...