The Power of Automated Threat Hunting The Power of Automated Threat HuntingSydni Williams-Shaw2024-04-24T21:06:08+00:00April 7, 2024|Read More
Struggling Under the Barrage of SIEM Alerts? Automate to Mitigate Using SOAR Struggling Under the Barrage of SIEM Alerts? Automate to Mitigate Using SOARSydni Williams-Shaw2024-04-24T21:05:28+00:00March 14, 2024|Read More
Automating Incident Response: A Use Case for Streamlined Remediation of Phishing Attacks Automating Incident Response: A Use Case for Streamlined Remediation of Phishing AttacksSydni Williams-Shaw2024-04-24T21:36:24+00:00February 6, 2024|Read More
The Evolution of Threat Intelligence: Empowering Organizations with Security Orchestration, Automation and Response The Evolution of Threat Intelligence: Empowering Organizations with Security Orchestration, Automation and ResponseSydni Williams-Shaw2024-04-24T21:36:58+00:00January 22, 2024|Read More
The Real-World Return on Investment from Security Orchestration, Automation, and Response (SOAR) The Real-World Return on Investment from Security Orchestration, Automation, and Response (SOAR)Sydni Williams-Shaw2024-04-24T21:37:32+00:00December 19, 2023|Read More
Engineering Principles for Developing Advanced Security Automations Engineering Principles for Developing Advanced Security AutomationsSydni Williams-Shaw2024-04-24T21:28:52+00:00November 19, 2023|Read More
Building Resilient Data Protection: The Benefits of Automated DLP Building Resilient Data Protection: The Benefits of Automated DLPSydni Williams-Shaw2024-04-24T21:34:33+00:00October 20, 2023|Read More