DTEX EDR Integrations: The Next Partner Opportunity

In the past few years, we have seen a massive correlation between data loss incidents and remote working. In fact, the DTEX i3 2022 Insider Risk Investigations Report found 75% of insider ...
ransomware SaaS Security

How to Know if You’ve Been Infected by Ransomware

Detecting ransomware activity has become increasingly difficult because adversaries are constantly evolving their tools, tactics and techniques. For example, threat actors are using new programming languages like Rust to help avoid detection ...
Security Boulevard
Achieving Operational Excellence in a Cybersecurity Program

Achieving Operational Excellence in a Cybersecurity Program

As cybersecurity threats continue to grow in complexity and frequency, achieving operational excellence in threat detection and response is more important than ever. However, SOCs (Security Operation Centers) often face a variety ...
Enabling File Integrity Monitoring on Windows with Osquery and EclecticIQ Endpoint Response

Enabling File Integrity Monitoring on Windows with Osquery and EclecticIQ Endpoint Response

File Integrity Monitoring (FIM) is a security control that helps organizations ensure the integrity of their files and systems by monitoring changes to files and directories. FIM is an important security control ...
If Infosec Was a Supermarket Business

If Infosec Was a Supermarket Business

By Jordan Durham I was recently reading an article which made a brief analogy between cybersecurity and a retail store. This got me thinking –  could there be a deeper analogy made ...
Horizon3.ai insider threat cybersecurity alert fatigue

Weak Creds, Unpatched Flaws, Reliance on Tools Plagued Orgs in 2022

Organizations often either have weak credential policies or don’t enforce them, making it easy for attackers to use legitimate credentials to log in—or live off the land—rather than using topflight tools to ...
Security Boulevard
AWS cloud security Palo Alto Networks OT endpoint, attacks, security

Do You Need EDR if You Already Have a Firewall?

Considering the effectiveness of an endpoint security solution when a firewall is already in place is a valid concern for any organization looking to run lean. On the surface, they can look ...
Security Boulevard
Why MSSPs Must Go Beyond Pure Efficiency to Deliver Value in Cybersecurity

Why MSSPs Must Go Beyond Pure Efficiency to Deliver Value in Cybersecurity

Today’s managed security service providers (MSSPs) are faced an eternal struggle when it comes to their customers. They must be able to provide a sufficient level of value while at the same ...
Compliance Does Not Equal Cybersecurity

Compliance Does Not Equal Cybersecurity

HIPAA, GDPR, PCI, CIS, NIST.  Does any of those acronyms sound familiar? Chances are, you’ve heard of several and have a general understanding of what they’re all about. For those that don't, ...
Data Philosophy and Technology Combine for Better Endpoint Security

Data Philosophy and Technology Combine for Better Endpoint Security

  Russel Ackoff was the one of first to define a hierarchy from data to wisdom (1). In Ackoff’s words: "Data are symbols that represent the properties of objects and events. Information ...