Category: User Behavior

Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the...
Read Now

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have...
Read Now

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more...
Read Now

Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Deck the hall with sad employees, Fa, la, la, la, la, la, la, la, la!  'Tis the season to be swindled, Fa,...
Read Now

Going on the Offense: How to Eliminate Internal Threats

Over the past few years, we’ve observed significant changes in the types of conversations we’re having with CISOs. What used...
Read Now