Q2 Threat Report. SOC trends to take action on | Gartner Report: Emerging Technologies and Trends Impact Radar
Find out how our SOC analysts used automation to reduce the time it takes to investigate and report a suspicious login by 75%. The team outlines the process and shares a case study of it in action.
During a recent red team engagement, the CrowdStrike EDR Platform alerted our SOC team on the execution of a suspicious VBScript file. This is what they learned from untangling the malware code.
Over the weekend, Expel’s analysts discovered a new way attackers are using Zoom to compromise users’ security. Here’s what they learned and what you can do to avoid getting duped.
There are four missteps we see happen often that open fast-growing companies up to unnecessary legal risks -- here’s how to course correct.
If your team doesn’t have lots of incident response practice under their belt (yet!), a threat emulation exercise is the perfect way to help them flex those response muscles and improve your collective skills.
Tactical advice on how to survive a security incident when you don’t have an incident response plan.