
The THIRTEENTH Annual Disaster Recovery Breakfast: Changing of the Guard
Posted under: What a long, strange trip it’s been over the last 3 years. In fact, the last time I saw many of you was at the last Disaster Recovery Breakfast in ...

Heading to Techstrong
Posted under: General The phone rang. On the other end, I heard a booming voice many of you are familiar with. “Hey Mikey! What’s shaking? What’s your plan now that Rich is ...
SOC 2025: Operationalizing the SOC
Posted under: Research and Analysis So far in this series, we’ve discussed the challenges of security operations, making sense of security data, and refining detection/analytics, which are all critical components of building ...

SOC 2025: Detection/Analytics
Posted under: Research and Analysis We spent the last post figuring out how to aggregate security data. Alas, a lake of security data doesn’t find attackers, so now we have to use ...

SOC 2025: Making Sense of Security Data
Posted under: Research and Analysis Intelligence comes from data. And there is no lack of security data, that’s for sure. Everything generates data. Servers, endpoints, networks, applications, databases, SaaS services, clouds, containers, ...
SOC 2025: The Coming SOC Evolution
Posted under: Research and Analysis It’s brutal running a security operations center (SOC) today. The attack surface continues to expand, in a lot of cases exponentially, as data moves to SaaS, applications ...
New Age Network Detection: Use Cases
Posted under: Research and Analysis As we wrap up the New Age Network Detection (NAND) series, we’ve made the point that network analysis remains critical to finding malicious activity, even as you ...
Papers Posted
Posted under: Research and Analysis It turns out that we are still writing papers and posting them in our research library, even though far less frequently than back in the day. Working ...
New Age Network Detection: Collection and Analysis
Posted under: Research and Analysis As we return to our series on New Age Network Detection, let’s revisit our first post. We argued that we’re living through technology disruption on a scale, ...
New Age Network Detection: Introduction
Posted under: Research and Analysis Like the rest of the technology stack, the enterprise network is undergoing a huge transition. With data stores increasingly in the cloud and connectivity to SaaS providers ...