Security Monitoring – It’s All About the Data
September 11, 2018
Security
In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential.…
Protection Methods – The Art of Data Analytics
The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…
Windows Workstation Logs – Integration
In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The…
Preparing Defense Networks for Cyberattacks
I’m the new Chief Technologist for our Federal and National Government team, and I’m glad to be joining the conversation with all of you. Here’s an interesting article from my…