Security How-To

    Security How-To
    4 min read | September 2, 2022

    Proper SIEM Tuning for Better Security Outcomes

    Read More
    Security How-To
    3 min read | August 16, 2022

    How to Use Your SIEM as a Business Enabler

    Read More
    Security How-To
    6 min read | August 9, 2022

    Detecting Microsoft Legacy Authentication with Blumira

    Read More
    Security How-To
    3 min read | August 3, 2022

    Is This Thing On? Microsoft 365 Security

    Read More
    Security How-To
    4 min read | July 13, 2022

    What You Need To Know About Windows Event IDs

    Read More
    Security How-To
    7 min read | June 3, 2022

    Building a SOC: What Does It Actually Take?

    Read More
    Security How-To
    37 min read | May 5, 2022

    How to Build a SOC on a Budget

    Read More
    Security How-To
    7 min read | April 27, 2022

    Understand Microsoft 365 Impossible Travel Rules

    Read More
    Security How-To
    13 min read | April 19, 2022

    Top 5 Office 365 Security Issues

    Read More
    Security How-To
    3 min read | April 11, 2022

    Defending Against Common Microsoft 365 Attacks

    Read More
    Security How-To
    10 min read | April 7, 2022

    The Return of IcedID and How to Detect It

    Read More
    Security How-To
    11 min read | March 14, 2022

    Protect Microsoft 365 From Business Email Compromise

    Read More
    Security How-To
    9 min read | March 11, 2022

    Analyzing MITRE’s Top Observed Attacker Techniques

    Read More
    Security How-To
    6 min read | February 15, 2022

    Top 7 Cloud Security Best Practices For 2022 

    Read More
    Security How-To
    4 min read | February 14, 2022

    Cover Your Assets: Performing a Successful Security Inventory

    Read More