Let's talk Security
Industry news, blog, videos and more
-
BlogMay 25, 2022
The Truth About Threat Intelligence: How it Works and Why You Need It
Timely, high-quality data can transform the speed and effectiveness of your team’s detection and response capabilities. In the 6th cent...
-
BlogMay 24, 2022
Information Security Sales Tactics: Don’t Fall for Fear, Uncertainty, and Doubt
Scary statistics and horror stories are effective sales drivers, but they don’t always lead to a great user experience. Take a brief gl...
-
NewsMay 16, 2022
Castra Named as Finalist in 2 SC Awards Categories
Castra’s combination of advanced analytics, threat intelligence, and human expertise is earning critical recognition. Durham, North Car...
-
BlogMay 13, 2022
Cyber Threat Intelligence: What You Need to Know to Protect Your Environment
When you hear the term “cyber threat intelligence,”? Is it the fact that cyber incidents top the Allianz Risk Barometer in 2022? That “...
-
BlogMay 11, 2022
Top Linux Security Mistakes and How to Avoid Them: Part 1
System administrators can make mistakes like anyone else. Improve your own security performance by learning from the mistakes of others...
-
BlogMay 11, 2022
How to Configure Your Windows Audit Policy to Optimize SIEM Performance
You can significantly improve Windows’ log reporting capabilities with a few key changes. (Updated May 2022) Your SIEM works by collect...
-
BlogMay 10, 2022
The 2 Cyber Threat Intelligence Tools You Need on Your Side
Preventing data breaches and protecting sensitive information is what cyber threat intelligence tools are designed to do—and they do it...
-
NewsApril 26, 2022
Castra Managed Services Successfully Renews SOC 2 Type II Attestation
Independent auditors verify the transparency and trustworthiness of Castra’s internal controls.
-
BlogApril 15, 2022
Is Your Security Vendor Suffering from an Identity Crisis?
Developing proprietary technology and delivering world-class service requires entirely different business models. Cybersecurity is a ch...
-
BlogApril 11, 2022
Everything You Need to Know About the Spring4shell Vulnerability
A newly discovered Spring vulnerability enables remote code execution on enterprise Java applications. In late March, a developer publi...
-
BlogApril 1, 2022
Top 5 Information Security Trends in 2022: Manufacturing
Internet-enabled manufacturers must take extra steps to secure operational technology. Cybercrime has risen sharply since the beginning...
-
BlogMarch 24, 2022
What Digital Transformation in Banking Means for Cybersecurity
Financial institutions have unique pain points to address in today’s rapidly changing security environment. The finance industry must m...