Best Free and Open Source SIEMs
We’ve evaluated seven SIEM platforms, pulling pros and cons from reliable online review sites. Find out the best free and open source SIEMs on the market.
Read MoreBuilding a SOC: What Does It Actually Take?
Before you go full steam ahead building out a full SOC, evaluate the problems that you might face as a smaller organization.
Read MoreUnderstand Microsoft 365 Impossible Travel Rules
Detecting impossible travel activity can help prevent cyberattacks such as account compromise and ransomware in Microsoft 365, formerly Office 365.
Read MoreTop 5 Office 365 Security Issues
Microsoft 365, formerly Office 365, is a common attack surface. Learn about the top Office 365 security issues facing organizations and how to prevent them.
Read MoreThe Return of IcedID and How to Detect It
Researchers have recently observed IcedID in recent campaigns as an initial access broker. Here's how to detect an attack in progress.
Read MoreDefend Against Russian-Sponsored Cyberattacks
Russian-sponsored cyberattacks follow similar playbooks to other highly-effective groups. Get to know TTPs that we've seen in the wild.
Read MoreTop 7 Cloud Security Best Practices For 2022
Follow these cloud security best practices to bring the same level of comfort and security that on-premises has into the cloud.
Read MoreEmail Forwarding Security Risk (And How to Detect)
Threat actors use email forwarding rules to access mailboxes and leak data in BEC attacks. Know the risks and how to detect new email forwarding rules.
Read MoreDetecting Log4j Exploits Leading to Ransomware
For opportunistic ransomware groups, Log4j is a low-hanging fruit to gain initial access into an environment. Learn how to detect Log4j exploits.
Read MoreHow To Detect Signs of Cuba Ransomware
Understand the methods that the Cuba variant uses to compromise victim systems and respond early enough to stop an attack in progress.
Read More