Threat Detection & Response Maturity: Modern Cybersecurity Practices, Part 3
In this three-part audio series, we'll share some insights from a cybersecurity professional with 18 years of experience in industrial network design and support, information and n...
Read MoreTop Security Threats: Lateral Movement
Lateral movement refers to an attacker moving through your environment, often to seek out data to steal or systems to disrupt. It consists of a series of techniques that allow them...
Read MoreCommon Threat Vectors & Industrial Control Systems (ICS): Modern Cybersecurity Practices, Part 2
In this three-part audio series, we’ll share some insights from a cybersecurity professional with 18 years of experience in industrial network design and support, information and...
Read MoreHow to Mitigate Against the SMBleed Vulnerability & POC Exploit
SMBleed Vulnerability and POC Exploit Released Mitigate Now What Happened? On June 9, security researchers at ZecOps announced a powerful new vulnerability within Windows' imple...
Read MoreAutomating Detection and Response With Cisco Firewalls & VPN
A number of security and collaboration tools are enabling the widespread work-from-home reality, allowing for secure remote access as your employees work from their own personal or...
Read MoreLogmira: Windows Logging Policies for Better Threat Detection
Blumira’s Sr. Incident Response Engineer Amanda Berlin has created a free set of pre-configured Windows policy settings, called Logmira (available on Github), to help any organiz...
Read More