Skip to content

    Security How-To

    Security How-To
    6 min read | August 3, 2020

    Test SIEM Detections for Password Spraying

    Read More
    Security How-To
    3 min read | July 16, 2020

    Five Easy Ways to Test Your SIEM's Detections - On-Demand

    Read More
    Security How-To
    6 min read | July 9, 2020

    How to Reduce Your Overall Attack Surface With Geoblocking

    Read More
    Security How-To
    1 min read | June 16, 2020

    How to Increase Windows Log Visibility: A Tutorial

    Read More
    Security How-To
    7 min read | June 10, 2020

    How to Mitigate Against the SMBleed Vulnerability & POC Exploit

    Read More
    Security How-To
    7 min read | June 8, 2020

    Logmira: Windows Logging Policies for Better Threat Detection

    Read More
    Security How-To
    2 min read | June 3, 2020

    Windows Logging Tips for Better Threat Detection - On-Demand

    Read More
    Security How-To
    9 min read | May 7, 2020

    Top Five Security Threats You Should Be Detecting

    Read More
    Security How-To
    16 min read | April 29, 2020

    How To Download, Install, and Configure Sysmon for Windows

    Read More
    Security How-To
    10 min read | April 23, 2020

    Replace Your SIEM: Traditional vs. Modern SIEM

    Read More
    Security How-To
    4 min read | April 20, 2020

    Hands in the Honeypot: Detecting Real Security Threats

    Read More
    Security How-To
    60 min read | April 13, 2020

    How to Optimize Windows Logging for Security

    Read More
    Security How-To
    15 min read | March 5, 2020

    Guide: How to Replace Your SIEM

    Read More
    Security How-To
    8 min read | March 4, 2019

    Detection as an Effective Strategy for Cyber Attacks

    Read More
    Security How-To
    6 min read | March 4, 2019

    How to Determine (And Stick To) a Cybersecurity Budget

    Read More