Let's talk Security
Industry news, blog, videos and more
Incident Response in Exabeam: How to Create Playbooks and Automate Security Incident Resolution
Learn how to use the platform’s security orchestration, automation, and response (SOAR) solution to quickly investigate and resolve sec...
BlogAugust 17, 2022
Risk Management for CISOs: Own Your Information Security Program
The CISO’s job is a leadership role that includes setting clear expectations and knowing how to meet them.
NewsAugust 15, 2022
Castra Named One of North America’s Fastest-Growing Solutions Providers
CRN places Castra on its annual Fast Growth 150 list for 2022 Durham, North Carolina — August 2022 — CRN has included Castra in its ann...
BlogAugust 4, 2022
How to Create a Ransomware-Ready Disaster Recovery Plan
Data disasters come in all shapes and forms, and enterprises need to have multi-layered contingencies in place. A good enterprise disa...
BlogAugust 3, 2022
Not All Attacks Are Preventable: Early Detection and Response is Crucial
Develop a multi-layered security posture that minimizes the damage attackers can cause. Cybersecurity technologies traditionally fall ...
BlogAugust 2, 2022
Four Ways Security Automation Can Improve Your Detection and Response Capabilities
Use modern automation tools to identify and mitigate attack risks more efficiently than otherwise possible. Cybercriminals are increas...
BlogJuly 28, 2022
How to Access and View Event Logs Using Exabeam in Linux
Examining event and endpoint logs is the first step towards building comprehensive customized rulesets. Many information security lead...
BlogJuly 27, 2022
Mobile Device Logs Count: Configure Exabeam to Prioritize Android Logs
Don’t assume users and employees will only use desktops to go about their business – even if that’s what they are supposed to do. Your...
BlogJuly 27, 2022
How to Set Up Robust Log Management in Linux with AuditD
Find out how to configure Linux to generate comprehensive log feeds for SIEM, UEBA, and SOAR technologies. Linux is an attractive solu...
BlogJuly 26, 2022
Craft Custom Rules to Improve Exabeam Performance: Part 2
Enriched data enables analysts to conduct faster, more accurate investigations in Exabeam. The first part of this series covered some ...
BlogJuly 21, 2022
Prioritize Indicators of Compromise: Investigate the Flaming Critical Indicator First!
Threat intelligence plays a crucial role in helping analysts identify and investigate high-risk activities. Threat intelligence soluti...
BlogJuly 20, 2022
How to Detect and Mitigate Compromised Credential Attacks
Most security technologies are ineffective against unauthorized users with stolen credentials. Cybersecurity vendors spend a great dea...
BlogJuly 19, 2022
How It Started and Where It's Going: The Castra Customer Experience
Enterprise security operations should empower users, not hold them back. Spend some time looking at cybersecurity headlines, and you’l...