Opinion
XDR at the Center of the New SOC
Key Takeaways from ESG’s most recent survey report “The Impact of XDR in the Modern SOC” ESG’s new survey “The Impact of XDR in the Modern SOC” is out, and one thing ...
Podcast: Uri May Talks XDR with Neil Hughes
Neil Hughes, the author of The Tech Talks Daily podcast, wanted to learn more about the hot emerging category of Extended Threat Detection and Response (XDR). His curiosity led him to Hunters ...
Podcast: Uri May Talks XDR with Neil Hughes
Neil Hughes, the author of The Tech Talks Daily podcast, wanted to learn more about the hot emerging category of Extended Threat Detection and Response (XDR). His curiosity led him to Hunters ...
XDR – The Cybersecurity X Factor
The “X Factor” is defined as an elusive circumstance, quality or entity with a strong positive influence. Simply put, the X Factor is what makes something cool. ‘XDR’ – Extended Detection and ...
XDR – The Cybersecurity X Factor
The “X Factor” is defined as an elusive circumstance, quality or entity with a strong positive influence. Simply put, the X Factor is what makes something cool. ‘XDR’ – Extended Detection and ...
Team Pentesting – The Unspoken Reality of Career Ethical Hacking
As a professional penetration tester, there’s one thing that rarely if ever gets discussed. Is it that the common image of a hacker, the lone wolf pounding away on a keyboard in ...
Most Security Pros Think Recent GDPR Fines Won’t Significantly Affect Policies
In July 2019, UK Information Commissioner’s Office (ICO) announced its intention to fine two companies for violating the European Union’s General Data Protection Regulation (GDPR). ICO began by disclosing its intention to ...
I’m Just Not Smart Enough to Work in Tech
“You work in tech! Wow, you must be so smart. I wish I was that smart. I'm just not smart enough to work in tech.” That’s what I used to say to ...
MFA is No Cure for Phishing
Last year my Twitter feed became full of stories and retweets about how Google “solved the phishing problem” using hardware multi-factor authentication (MFA) tokens. One such article covering this topic was “Google: ...
Security Assumptions – Don’t Make an ASS of U and ME
Have you ever stopped to ask yourself if the things you are defending against are really your biggest security problems? I am going to challenge you to think about things a little ...

