Category: Incident Response

NTLM Reflection Attack? Not for Preempt Customers

NTLM strikes again! Microsoft released a patch this week, CVE-2019-1384, which addresses a bypass vulnerability that allows attackers to successfully...
Read Now

How User Interface Design Drives Better Threat Detection

The most well-known data breach in our industry occurred in December 2013, when more than 40 million credit card numbers...
Read Now

Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the...
Read Now

Solving Log Storage: How You Can Save Money and Meet Compliance Requirements

Logs. At best: They’re a vital part of your information security strategy to “find the bad." At worst: They’re a...
Read Now

Security Weekly Interview: Securing Identity With Conditional Access

Organizations often have incomplete views of who is accessing what, when, where and how across multiple applications and systems. Understanding...
Read Now