Let's talk Security
Industry news, blog, videos and more
-
BlogMay 13, 2022
Cyber Threat Intelligence: What You Need to Know to Protect Your Environment
When you hear the term “cyber threat intelligence,”? Is it the fact that cyber incidents top the Allianz Risk Barometer in 2022? That “...
-
BlogMay 11, 2022
Top Linux Security Mistakes and How to Avoid Them: Part 1
System administrators can make mistakes like anyone else. Improve your own security performance by learning from the mistakes of others...
-
BlogMay 11, 2022
How to Configure Your Windows Audit Policy to Optimize SIEM Performance
You can significantly improve Windows’ log reporting capabilities with a few key changes. (Updated May 2022) Your SIEM works by collect...
-
BlogMay 10, 2022
The 2 Cyber Threat Intelligence Tools You Need on Your Side
Preventing data breaches and protecting sensitive information is what cyber threat intelligence tools are designed to do—and they do it...
-
NewsApril 26, 2022
Castra Managed Services Successfully Renews SOC 2 Type II Attestation
Independent auditors verify the transparency and trustworthiness of Castra’s internal controls.
-
BlogApril 15, 2022
Is Your Security Vendor Suffering from an Identity Crisis?
Developing proprietary technology and delivering world-class service requires entirely different business models. Cybersecurity is a ch...
-
BlogApril 11, 2022
Everything You Need to Know About the Spring4shell Vulnerability
A newly discovered Spring vulnerability enables remote code execution on enterprise Java applications. In late March, a developer publi...
-
BlogApril 1, 2022
Top 5 Information Security Trends in 2022: Manufacturing
Internet-enabled manufacturers must take extra steps to secure operational technology. Cybercrime has risen sharply since the beginning...
-
BlogMarch 24, 2022
What Digital Transformation in Banking Means for Cybersecurity
Financial institutions have unique pain points to address in today’s rapidly changing security environment. The finance industry must m...
-
BlogMarch 24, 2022
Glass Box MDR That Never Takes a Break
Whether you have an in-house team or outsource your security operations to a managed services provider, the potential for a security br...
-
BlogMarch 24, 2022
Managed Detection & Response Tip: Don’t Ignore These 4 Cyber Threats
Managed detection and response (MDR) works very well to catch hacks and attacks before small issues turn into big problems. But the vas...
-
BlogMarch 22, 2022
Penetration Testing: The Key to Measuring InfoSec Success
Don't leave security preparedness up to chance. Simulate attacks to test and improve your security posture. As business and IT leaders ...