Autonomous network security monitoring; analyzing the ‘breadcrumbs’ that are hiding in your Palo Alto Networks IPS/IDS logs
Tim Wenzlau | July 10, 2018
Product, Security Analysts
As Security Analysts, Instead of Threat Hunting We’ve Become Ticket Monkeys
Tim Wenzlau | June 15, 2018
Perspective, Security Analysts, Security Operations
You Don’t Have SOC Analysts, You Have SOC Synthesists
Jeff Lahann | June 11, 2018
SOC Design Approach: The Data Scientist and SOC Analysts Should Talk
John Petropolous | May 29, 2018
What Would Ali Say About Being #124 on the Cybersecurity 500 List?
Kelly Cottrell | May 21, 2018
Why Did Gartner Name Us a 2018 Cool Vendor for Security Ops & Vulnerability Management?
Kelly Cottrell | May 17, 2018
SOC Events Per Analyst Hour aka (EPAH)
Chris Calvert | May 14, 2018
CB Insights Recognizes We’re Well on Our Way to Transforming Cybersecurity
Kelly Cottrell | April 19, 2018
Did You Know Security Engineering Has Hidden Costs?
John Petropolous |
What If Your Frontline Cybersecurity Ops Team Had Malware Detection Robots to Help?
Chris Calvert | April 17, 2018