Home » Articles posted by 1258

What is a Red/Blue/Purple Team?

When working in cybersecurity circles, the terms “Red team” and “Blue team” are bound to make an appearance. In this blog post, we go over the exact definition, origination, and how these terms can help advance your cybersecurity performance.
Continue reading

What is a TIP?

Security organizations need to stay ahead of threats. In this blog we go over how TIP enables your threat intelligence program, brings your security team the automation it needs, and three key performance functions.
Continue reading

What is SOAR?

SOAR is an acronym that addresses many major challenges that security teams are facing today, by using a collection of software solutions and tools that allow organizations to streamline security operations and create more effective systems.
Continue reading

What is SIEM?

SIEM systems can save IT and Security teams from spending copious amounts of time digging through logs and events to find suspicious behavior and much more. Read this blog to learn more.
Continue reading

What is Brand Protection?

What is your adversary’s largest attack vector? Is it a web page? A virus? An email attachment? Hint: It is your greatest and most vital asset. Your brand. Annually, lost revenue as a result of brand fraud costs companies over $1 trillion worldwide.
Continue reading

What is Cybersecurity Forensics?

Today's society has created an increased demand for cybersecurity forensics as a necessity for any security team. Forensic data captured provides the information needed that often leads to breach identification.
Continue reading

Building your IR Plan Step-by-Step

Now that the team is in place, it’s time to build out your IR plan. In blog 3 in this series, we go in detail of the six steps of Incident Response. Remember, a strong IR plan helps you to both prepare and prevent security incidents.
Continue reading

What is Phishing?

In part 1 of this 3-part blog series, we’ll delve into phishing and take a look at how you can protect yourself by deploying a strategy of threat protection for your company.
Continue reading