Overview
Explore
Labs
Services
Events
Partners
Select a tab
51 results found
Understanding Salt Typhoon: Why Security Leaders Should Take Notice
Salt Typhoon, a Chinese state-sponsored cyber espionage campaign, has targeted critical U.S. telecommunications infrastructure, exposing vulnerabilities and compromising sensitive data. This sophisticated operation underscores the urgent need for robust cybersecurity measures and heightened awareness among security leaders to protect against evolving threats.
Blog
• Feb 7, 2025
A Practitioner's Guide: Automation within Security Operations
Security operations automation has evolved from basic manual processes to sophisticated, AI-enhanced workflows. Traditional SOAR helps standardize these tasks, but newer "hyperautomation" platforms promise to take it further with cloud-native architectures and built-in AI.
Blog
• Jan 30, 2025
How Generative AI Impacts Identity and Access Management
Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
• Aug 7, 2023
SIEM Overload to Smart Security: The Power of Data Pipeline and Modern Storage
Traditional SIEMs have long been treated as massive log repositories, leading to skyrocketing costs and visibility gaps. Data pipeline management changes the game — optimizing log ingestion, enriching security data, and reducing SIEM costs without sacrificing detection capabilities. Learn how modern data pipelines, security data lakes and AI-driven analytics are transforming SOC efficiency and redefining how organizations manage security telemetry.
Blog
• Feb 26, 2025
WWT Partner Innovation Highlights S4 2025
Read on for highlights from the S4 2025 conference focusing on Innovative OT Security Solutions.
Blog
• Feb 26, 2025
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
• Jan 24, 2023
A Practitioner's Guide: SOC of the Future
Is the future here? Can we build a scalable, agile foundation that leverages robust data management and pipelines to enable real-time alerting? Can it leverage AI-augmentation and automated responses to proactively detect and mitigate threats? I think we may be close...
Blog
• Mar 10, 2025
A Practitioner's Guide: Detections within Security Operations
The analytics engine, sometimes referred to as a detection engine, is the core of a modern security operations center (SOC), generating high-fidelity alerts and adding context so responders can quickly identify and act on threats. In this article we discuss the evolution of security operations detections, and the major players in the space.
Blog
• Mar 3, 2025
Navigating the SIEM Journey: Insights, Challenges and the Future
Discover the power of Security Information and Event Management (SIEM) in modern cybersecurity. This blog explores how SIEM consolidates data, detects threats, enhances compliance and empowers SOC teams to stay ahead of cyber adversaries. Learn about its benefits, challenges and the future of SIEM in defending against evolving threats while optimizing your security operations.
Blog
• Jan 10, 2025
Healthcare Technology Insights for 2025
The unprecedented speed at which regulatory and political changes are announced by our new federal administration is requiring healthcare executives to find balance between strengthening their core business and catching up with the AI train that has taken most industries by storm. The endless opportunities made possible by AI for reinventing healthcare are offset by the risks associated with increasing cyber threats and workforce challenges. Collectively, this promises to make 2025 a year like no other.
Blog
• Feb 27, 2025
Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer
This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
• Jan 7, 2025
The 3 R's of Cybersecurity to Combat Insider Threats
Insider threats, now better termed "insider risks," extend beyond disgruntled employees to include careless vendors and compromised contractors. By focusing on the 3 R's of cybersecurity — risk, resilience and recovery — companies can mitigate these risks and protect their intellectual property and data from internal threats.
Blog
• Oct 21, 2024