Cyber Cyber, Burning Bright: Can XDR Frame Thy Fearful Asymmetry?
The security industry is engulfed in the most asymmetric cyberwarfare we have ever seen. The outcome of an Attacker’s mission...
The security industry is engulfed in the most asymmetric cyberwarfare we have ever seen. The outcome of an Attacker’s mission...
As people turn to the Internet for news and answers to tough questions, it only makes sense that it would...
In response to the latest MITRE Engenuity ATT&CK® Evaluation 3, McAfee noted five capabilities that are must-haves for Sec Ops and displayed in the evaluation. This blog will speak to the alert actionability capability which...
In Part 1 of our Through Your Mind’s Eye series, we explored how our brains don’t give each decision we...
Imagine this scenario: a CEO, CIO, CTO, CISO walk into a bar… The CTO has heard about cocktails that go...
Summer is here, which means more sun and more fun for everyone. It also means more streaming, gaming, and downloading. This seasonal reality reminds...
When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter...
In the wake of the Schrems II decision, and even more in the light of Friday’s Facebook ruling, the question...
Cybersecurity and biases are not topics typically discussed together. However, we all have biases that shape who we are and,...
In our last blog about defense capabilities, we outlined the five efficacy objectives of Security Operations, that are most important...