Cybersecurity Analysis, Network Security Monitoring, Security Analysis Software, Security Analysts, Security Monitoring Program, SOC Analysis, Uncategorized

Falling Through the Cracks: Is Your Cybersecurity Analysis Catching Everything?

Chris Calvert | September 9, 2019

Cybersecurity Analysis, Cybersecurity Solutions, Security Operations, Security Operations Software, SOC Analysis, Uncategorized

7 Expert Tips on How to Maximize Your Security Operations

Chris Calvert | August 26, 2019

Cybersecurity Analysis, Uncategorized

Math Doesn’t Lie When It Comes to Cybersecurity Analysis

Chris Calvert | July 30, 2019

Cybersecurity Analysis, Security Analysis Software, Security Operations, Security Operations Software, SOC Analysis

Security Operations: Outsource vs. In-House, The Saga Continues

Chris Calvert | June 17, 2019

Perspective, Research, Security Operations, Uncategorized

What’s Old is New: How Old Math Underpins the Future of A.I. in Security Operations

Chris Calvert | June 4, 2019

Perspective, Security Analysts, Security Geek, Security Operations

The Science of Detection Part 2: The Role of Integrated Reasoning in Security Analysis Software

Chris Calvert | January 22, 2019

Perspective, Security Analysts, Security Operations

The Science of Detection Part 1: 5 Essential Elements of a Data Source

Chris Calvert | January 4, 2019

Cybersecurity Analysis, Perspective, Security Analysts

Algorithmic Stealth and the Security Arms Race

Chris Calvert | October 16, 2018

Network Security Monitoring, Perspective, Research, Security Monitoring Program, Security Operations

PERCEPTION VS. REALITY: The Myth of 100 Security Data Sources

Chris Calvert | August 23, 2018

Join our growing community! Subscribe to our newsletter, the "First Responder Notebook," delivered straight to your inbox.