Enterprise IT security is driven by data. Network endpoints generate vast volumes of log metrics...
Security & Compliance Blog
Kerberos Authentication: What It Is and How It Works
What is Kerberos Every time users log into a service by providing their credentials, they are...
Risk Assessment vs Vulnerability Assessment: How To Use Both
We’ve all heard the quote “Information is the lifeblood of an organization”. Whenever I hear it, I...
What is CVE? Common Vulnerabilities and Exposures Explained
Common Vulnerabilities and Exposures, often known simply as CVE, is a list of publicly disclosed...
Patch Management: A Brief Introduction
Anyone who has ever dealt with computer issues knows that maintaining their system is a serious...
A Primer on Endpoint Detection & Response (EDR)
Although computer system security has been around for decades, endpoint detection and response...
The 2020 Gartner Magic Quadrant for Application Security Testing
Published by the leading IT consulting firm Gartner, Magic Quadrants are a series of market...
What Is Security Orchestration, Automation, and Response (SOAR)?
A relatively new platform for data security is Security Orchestration, Automation, and...