Support & Downloads

Quisque actraqum nunc no dolor sit ametaugue dolor. Lorem ipsum dolor sit amet, consyect etur adipiscing elit.

s f

Contact Info
198 West 21th Street, Suite 721
New York, NY 10010
youremail@yourdomain.com
+88 (0) 101 0000 000
Follow Us

Security

Industrial Control System (ICS) Ransomware is Evolving…Quickly Several months ago we wrote a blog post called The Evolution of Malware which tracked the development of how cyber-attacks and malicious code have evolved from simple viruses and worms to highly-sophisticated and

Four Recommendations to Improve the Effectiveness of your SOC The ultimate goal of this blog post is to provide 4 or so understandable, actionable recommendations for improving SOC effectiveness. To get there from here let’s discuss the mission of an SOC

How to Improve Security Operation Center (SOC) Effectiveness – Part 1 So many articles and blog posts have been written on SOCs, how they are structured, what their mission and purpose is, and of course how to improve their effectiveness. I

The IDC Global DNS Threat Report released last summer revealed that 82% of organizations were victims of DNS attacks with each suffering an average of 9 DNS attacks which was an increase of 34%. In addition, over 63% of the

Why Organizations Aren’t Ready for the California Consumer Privacy Act (CCPA) The California Consumer Privacy Act (CCPA) went into effect on January 1st, and many organizations haven’t started preparing to comply with the legislation. In fact, the state of California itself

Top 5 Cyber Security Predictions for 2020 In conversations with industry analysts, our customers, combing through the statistics like Comparitech's breach data and ultimately talking amongst ourselves we came up with 5 IT security predictions for 2020 that may not be

A SIEM’s Role in Network Security Analysis and Monitoring We put together a series of blog posts that deal with Network Security Design and Log Monitoring that are hopefully providing you clear, straightforward information about the real basics of Network Security.

Why Log Monitoring and Management is Critical to IT Security In our last blog post titled “The Fundamentals of Network Security Analysis and Monitoring” we discussed active versus passive security devices, flow analysis versus packet analysis, and several of the security