Security How-To

Building a SOC: What Does It Actually Take?
Read More
How to Build a SOC on a Budget
Read More
Understand Microsoft 365 Impossible Travel Rules
Read More
Top 5 Office 365 Security Issues
Read More
Defending Against Common Microsoft 365 Attacks
Read More
The Return of IcedID and How to Detect It
Read More
Protect Microsoft 365 From Business Email Compromise
Read More
Analyzing MITRE’s Top Observed Attacker Techniques
Read More
Top 7 Cloud Security Best Practices For 2022
Read More
Cover Your Assets: Performing a Successful Security Inventory
Read More
Detecting DNS Tunneling: The Light At The End
Read More
Email Forwarding Security Risk (And How to Detect)
Read More
Shortening Ransomware Dwell Time Requires Fast Detection
Read More
Catch a Pentester: Putting Your SIEM to the Test
Read More
How To Detect AS-REP Roasting With Blumira
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.