Building a SOC: What Does It Actually Take?
Before you go full steam ahead building out a full SOC, evaluate the problems that you might face as a smaller organization.
Read MoreUnderstanding Microsoft 365 Impossible Travel Rules
Detecting impossible travel activity can help prevent cyberattacks such as account compromise and ransomware in Microsoft 365, formerly Office 365.
Read MoreTop 5 Office 365 Security Issues
Microsoft 365, formerly Office 365, is a common attack surface. Learn about the top Office 365 security issues facing organizations and how to prevent them.
Read MoreThe Return of IcedID and How to Detect It
Researchers have recently observed IcedID in recent campaigns as an initial access broker. Here's how to detect an attack in progress.
Read MoreHow To Defend Against Russian-Sponsored Cyberattacks
Russian-sponsored cyberattacks follow similar playbooks to other highly-effective groups. Get to know TTPs that we've seen in the wild.
Read MoreTop 7 Cloud Security Best Practices For 2022
Follow these cloud security best practices to bring the same level of comfort and security that on-premises has into the cloud.
Read More