Logging

The Limitations of Using Logs for Behavioral Analytics

Threat detection hasn’t kept up with the change of pace that is occurring across today’s organizations. Security protections are strained and threats have evolved to take advantage of blind spots circumventing immediate detection. We’ll see more malware learn behaviors and conditions and then take evasive actions to avoid having their activities exposed. Unfortunately, traditional security…

Read More
Win by Finding Threats and Risks Faster

There are No Mulligans in Cybersecurity

Anyone who knows me, knows I like golf. They also know that I’ve focused my career on helping organizations enable the best security solutions for protecting their information, assets, and networks. I’ve talked to hundreds of security leaders about their environments, challenges, and constraints. Repeatedly, not one of them can smile and confidently state they…

Read More