Security operations | 7 min readHow to identify when you’ve lost control of your SIEM (and how to rein it back in)
See if these four telltale warning signs get your head nodding. If so, learn how to get started on regaining control.
Talent | 5 min readAn inside look at what happened when I finally took a vacation (for realsies)
I returned from my vacation with more than a tan. Here are 7 not-so-obvious things I learned by stepping away and unplugging from the office.
Security operations | 8 min readThe top five pitfalls to avoid when implementing SOAR
SOAR isn’t really about “orchestration and response.” It’s an engineering problem at its core. Here’s why.
Security operations | 4 min readDon’t blow it — 5 ways to make the most of the chance to revamp your security posture
If you’ve got a blank canvas with the opportunity to build a security program from scratch, here’s how to get started and make the most of your new program.
Tips | 4 min readFour common infosec legal risks and how to mitigate them
There are four missteps we see happen often that open fast-growing companies up to unnecessary legal risks -- here’s how to course correct.
Tips | 6 min readDear fellow CEO: do these seven things to improve your org’s security posture
Need to get the security train back on the tracks? Our CEO’s got some pro tips on improving your org’s security ASAP.
Security operations | 4 min readHow to start a cybersecurity program (or restart one that lapsed)
If you're left holding the hot potato of a legacy lackluster security program, or are suddenly forced to protect your org and its data with less, here are a few quick steps to take to get cybersecurity efforts back on track.
Talent | 3 min readGet your security tools in order: seven tactics you should know
Do you have the equipment and material needed to get your work right? Here are seven things to keep in mind to bring harmony to your toolchain. (4 min read)