Cybersecurity Analysis, Perspective, Security Analysts

Algorithmic Stealth and the Security Arms Race

Chris Calvert | October 16, 2018

Perspective, Product, Research

A New Tool for Defenders – Real-time Analysis of Web Proxy Data

Greg Taylor-Broun | October 15, 2018

Research, Security Analysts, Security Operations

How Automating Long Tail Analysis Helps Security Incident Response

John Petropolous | October 12, 2018

Perspective, Research, Security Analysts

4 Reasons Your MSSP Might Not Be Providing Dependable Security Monitoring

Steven Wimmer | September 27, 2018

Company, Perspective, Research

The Power of Humans Working With Machines

Tim Wenzlau | September 26, 2018

Company, Cybersecurity Analysis, Cybersecurity Solutions, Product

Respond Software Named Top 25 CyberSecurity Innovators

Tim Wenzlau | August 27, 2018

Network Security Monitoring, Perspective, Research, Security Monitoring Program, Security Operations

PERCEPTION VS. REALITY: The Myth of 100 Security Data Sources

Chris Calvert | August 23, 2018

Network Security Monitoring, Perspective

Autonomous Network Security Monitoring for Energy and Manufacturing Infrastructures

Mitch Webb | August 13, 2018

Perspective, Security Analysts, Security Operations

Ripping off the Bandage: How AI is Changing the SOC Maturity Model

Chris Calvert | July 30, 2018

Perspective, Product, Security Analysts, Security Operations

When Currency Is Time, Spend It Threat Hunting

Steven Wimmer | July 25, 2018

Join our growing community! Subscribe to our newsletter, the "First Responder Notebook," delivered straight to your inbox.