<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">

Security Architectures

May 12, 2020

Modern Architectures Require New Security Strategies for Digital Assets

Monitoring your Security DMZ and Securing your File Uploads
November 8, 2019

3 Ways High-Priority Malware Detection Can Fill SOC Gaps

Given today’s threat landscape, operating an enterprise Security Operations Center (SOC) presents a high-stakes challenges. With modern IT infrastructures comprised of a labyrinth of assets, endpoints, and third-party dependencies, threat actors continue to succeed in infiltrating vulnerable systems with inherently sophisticated, difficult-to-detect malware.
August 23, 2019

How Existing Cybersecurity Frameworks Can Curb Supply Chain Attacks

Supply chain attacks are a growing concern of any organization today. The goal of this type of attack is to compromise an organization via insecure components in the organization’s supply chain.
August 15, 2019

Top Ways to Get More Value From Your EDR

4 Ways to Optimize Your #EDR with #TitaniumPlatform and Deliver Better Security Content to Your Analysts. Read How to Get More Value From Your #EDR
April 22, 2019

Increase Your SIEM and SOAR Return on Investment with ReversingLabs

On one side you have your SIEM investment – connecting multiple security event sources, correlating source information and creating events on anything that looks threatening. On the other side you have your response process, often home built, or maybe you have invested in one of the new SOAR tools.
January 14, 2019

Customer Use Case: Combatting Undetected Malware with Tanium and ReversingLabs

We’ve seen some exciting customer results from our partnership with Tanium. This blog focuses on the results and lessons learned from a proof of concept (PoC) completed with one of these customers.