Cybersecurity Monitoring, Product, Security Operations

Maximize the MITRE ATT&CK® Framework with the Respond Analyst

Mike Reynolds | May 12, 2020

Product

Endpoint Detection and Response (EDR) Systems are like DVRs

Mike Reynolds | April 21, 2020

Security Operations Software

Automated Threat Detection: How Cybersecurity is like a Puzzle

Mike Reynolds | March 4, 2020

Security Operations Software

SOC Automation | More Threat Hunting, Less Screen Time

Mike Reynolds | February 18, 2020

Company, Product, Security Analysis Software, Security Monitoring Program, Uncategorized

Don’t Settle – Respond Software Offers a Better Service for Finding Incidents Faster and More Efficiently (at a Fraction of the Cost)

Mike Reynolds | November 18, 2019

Cybersecurity Solutions, Network Security Monitoring, Uncategorized

Casting a Wider Net – Enhanced Web Filtering Support in the Respond Analyst

Mike Reynolds | October 29, 2019

Cybersecurity Analysis, Network Security Monitoring, Security Analysis Software, Security Operations Software

How to Quickly Maximize the Value of Your Cortex Data Lake with the Respond Analyst

Mike Reynolds | October 1, 2019

Cybersecurity Solutions, Network Security Monitoring, RDA Software

Snake Oilers Podcast: Stop Chasing Cyber Security False Positives

Mike Reynolds | September 25, 2019

Cybersecurity Solutions, Security Analysis Software, Security Monitoring Program, SOAR

Putting the Automation into SOAR

Mike Reynolds | September 4, 2019

Artificial Intelligence, Cybersecurity Analysis, Network Security Monitoring, Security Analysis Software, Security Monitoring Program

Can Security Teams Effectively Respond to Cyber Threats Without AI?

Mike Reynolds | August 22, 2019