When shopping around for cybersecurity vendors, it can be hard to distinguish and determine which vendor is right for your organization. This is especially true with deception, a sector that is still...
Netwrix announced the release of Netwrix Auditor X. An important milestone in the product’s fifteen-year history, the new version is dedicated to helping organizations around the world become safer...
Logpoint 6.10 makes it easier for analysts to collaborate on and share the latest security information while providing more details during investigation.
Today’s security teams are facing more complexity than ever before. IT environments are changing and expanding rapidly, resulting in proliferating data as organizations adopt more tools to stay on...
In recent years, threat hunting has become much more widely adopted, but today the definition of threat hunting is still quite a controversial topic. Threat hunting is the art of finding the unknown...
Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be...
During COVID-19 employees within various organizations started to work from home more and more. Organizations see the advantages this brings in relation to the productivity. The downside of this...
Tactics are the core of the ATT&CK framework and represent the “why” of an ATT&CK technique. It is the adversary’s tactical objective: the reason for performing an action. Tactics group...