Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for ...

What’s New in 3.1? New Dashboard, Exciting Integrations, and A Free Product!

Preempt is happy to release version 3.1, available today! Included in the release are a brand new security assessment dashboard, exciting features offering more visibility and better password and network security, new ...

Taming Network Chaos By Understanding User Behavior

Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable ...

What DevOps Can Teach Us About Cybersecurity

DevOps and cybersecurity are both top priorities for many enterprises, as well as areas that have experienced considerable innovation recently. And even though these are two very different sides of IT, there ...

Catching Bloodhound Before it Bites

BloodHound is a public and freely available tool that uses graph theory to automate much of the confusion behind understanding relationships in an Active Directory (AD) environment. It allows hackers and pentesters ...

A CISO’s perspective: Solving a 20-year cyber security problem

My partner Jay Leek and I have decades of experience as CISOs. We’ve both literally spoken with hundreds of security companies and it’s easy to become jaded. It's rare that we get ...

We’ve raised $27.5 million: How Preempt’s funding validates Identity and Access Threat Prevention

Preempt began with a basic premise: Effective security within an enterprise should combine threat detection and real time response within a single solution. As enterprises transition to the cloud and the perimeter ...

How to Strengthen Your Cyber Security DNA

Cyber security is a complex animal that requires many disciplines and a diverse toolkit. Typically, resources are limited, and incident response and security staff are overloaded with noise, irrelevant alerts and incomplete ...

Secure Guardrails