Cybersecurity Blog

Featured Post

COVID-19 Surges have the Healthcare Sector Under Pressure and Under Attack

In the fall of 2020, a joint advisory from the Cybersecurity and Infrastructure Security Advisory (CISA), FBI, and Department of Health and Human Services (HHS) placed a startling spotlight on the tactics, techniques, and procedures used by cybercriminals to target the healthcare and public...


( read )

Tags: cybersecurity, intrusion response, ransomware,

Beyond the Stack: A Single Solution for Enterprise-wide Threat Detection and Response

While many cybersecurity professionals have come to believe adding more tools to their security stack gives more protection,...


( read )

Tags: cybersecurity, intrusion response, data protection,

What Does the SolarWinds Orion Attack Say about the State of Cybersecurity?

While the reports are still rolling in, we have a pretty good understanding of what occurred with the recent SolarWinds attack.


( read )

Tags: cyber attack, cybersecurity, intrusion response,

Top Security Trends for 2021 (and What They Mean for You)

2020 was a crazy year, and one none of us is likely to forget. But as we look ahead to 2021, here are five cybersecurity...


( read )

Tags: data breach, cybersecurity, intrusion response,

The Problem with Traditional Approaches to Threat Detection and Response

Let’s face it: The current, standard approach to threat detection and response just isn’t cutting it. But now, a choice of two...


( read )

Tags: cyber attack, cybersecurity, intrusion response,

How to achieve complete threat detection and response at 10% the cost of other tools

Achieving comprehensive, effective, and efficient threat detection and response has been an ongoing struggle for most...


( read )

Tags: cybersecurity, intrusion response, intrusion detection

What is CMMC, and How Can You Make Sure You’re in Compliance?

Just what is the Cybersecurity Maturity Model Certification (CMMC), and how can you make sure you can meet it? See exactly how...


( read )

Tags: data breach, cybersecurity, intrusion response,

New Ways to Managing Suddenly Remote SOC Teams and Processes

Say goodbye to the concept of “business as usual.” COVID-19 has changed virtually every normal process, including...


( read )

Tags: cybersecurity, intrusion response, intrusion detection

Webinar: Using AI and ML to Improve Threat Detection and Response

Companies of all sizes continue to struggle when it comes to detecting and stopping cyberattacks. Now you can learn how the...


( read )

Tags: cybersecurity, intrusion response, intrusion detection

Stop Threats With ARIA SDS and SumoLogic's New Integration

A new out-of-the-box integration between Sumo Logic’s Continuous Intelligence Platform and ARIA Cybersecurity Solutions’ ARIA...


( read )

Tags: cybersecurity, siem, intrusion response,