Security How-To
![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/amanda-berlin-219x300-4.png?length=360&name=amanda-berlin-219x300-4.png)
Security How-To
3 min read
| July 16, 2020
Five Easy Ways to Test Your SIEM's Detections - On-Demand
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/us-orbitjpg.jpg?length=360&name=us-orbitjpg.jpg)
Security How-To
6 min read
| July 9, 2020
How to Reduce Your Overall Attack Surface With Geoblocking
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/IncreaseVisibility.png?length=360&name=IncreaseVisibility.png)
Security How-To
1 min read
| June 16, 2020
How to Increase Windows Log Visibility: A Tutorial
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/smbleed-scaled.jpg?length=360&name=smbleed-scaled.jpg)
Security How-To
7 min read
| June 10, 2020
How to Mitigate Against the SMBleed Vulnerability & POC Exploit
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/microsoft-keyboard.jpg?length=360&name=microsoft-keyboard.jpg)
Security How-To
7 min read
| June 8, 2020
Logmira: Windows Logging Policies for Better Threat Detection
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/amanda-berlin-219x300-4.png?length=360&name=amanda-berlin-219x300-4.png)
Security How-To
2 min read
| June 3, 2020
Windows Logging Tips for Better Threat Detection - On-Demand
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/lego-light-scaled.jpg?length=360&name=lego-light-scaled.jpg)
Security How-To
9 min read
| May 7, 2020
Top Five Security Threats You Should Be Detecting
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/abstract-waves.jpg?length=360&name=abstract-waves.jpg)
Security How-To
16 min read
| April 29, 2020
How To Download, Install, and Configure Sysmon for Windows
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/eval-guide-cover-1.png?length=360&name=eval-guide-cover-1.png)
Security How-To
10 min read
| April 23, 2020
Replace Your SIEM: Traditional vs. Modern SIEM
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/Honeypot.png?length=360&name=Honeypot.png)
Security How-To
4 min read
| April 20, 2020
Hands in the Honeypot: Detecting Real Security Threats
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/Imported_Blog_Media/code-light-keyboard.jpg?length=360&name=code-light-keyboard.jpg)
Security How-To
60 min read
| April 13, 2020
How to Optimize Windows Logging for Security
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/New%20Website%20Images/Product%20Pages%20Images/Whitepaper%20SIEM%20Eval%20Guide.png?length=360&name=Whitepaper%20SIEM%20Eval%20Guide.png)
Security How-To
15 min read
| March 5, 2020
Guide: How to Replace Your SIEM
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/DetectionAsProtection.png?length=360&name=DetectionAsProtection.png)
Security How-To
8 min read
| March 4, 2019
Detection as an Effective Strategy for Cyber Attacks
Read More![](https://4554405.fs1.hubspotusercontent-na1.net/hub/4554405/hubfs/StickingToABudget.png?length=360&name=StickingToABudget.png)
Security How-To
6 min read
| March 4, 2019
How to Determine (And Stick To) a Cybersecurity Budget
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.