Protect Your Digital Profile image

[NCSAM Blog] How to Protect Your Digital Profile

As National Cyber Security Awareness Month (NCSAM) wraps up for 2019, we’d like to highlight one more concept: how to protect your digital profile. This goes along with this year’s NCSAM theme, “Own it. Secure it. Protect it.” We covered the first two topics in our previous posts on owning your digital profile and securing your digital profile. In this… Read More

Your Digital Profile image

[NCSAM Blog] How to Secure Your Digital Profile

October is National Cyber Security Awareness Month (NCSAM), which you can follow on Twitter using the hashtag #CyberAware. We’re excited to be a 2019 Champion! As we mentioned in our previous post about owning your digital profile, 2019’s theme is “Own it. Secure it. Protect it.” In this blog post, we’ll talk about how to secure… Read More

active eye dashboard image

Security Automation in ActiveEye 2.0 Identifies and Resolves Threats Faster

Security automation is critical to identifying threats and resolving alerts faster. It plays a starring role in the latest release of our cloud-native Security Orchestration and Automation (SOAR) platform, ActiveEye 2.0. Here are just a few highlights of all the new features: Advanced security automation processes more than 95 percent of alerts, so our security operations… Read More

Digital Profile image

[NCSAM Blog] How to Own Your Digital Profile

October is National Cyber Security Awareness Month (NCSAM)! The theme for 2019 is “Own it. Secure it. Protect it.” This includes a focus on how to own your digital profile. NCSAM is centered around cyber security safety both at home and in the workplace and, as we mentioned in a previous blog, NCSAM was put together by… Read More

Continuous Monitoring Strategy image

The Value of a Good Continuous Monitoring Strategy

Developing a continuous monitoring strategy is gaining a lot of momentum within many U.S. government agencies and businesses that want to better manage cyber security risk. As we mentioned in our previous blog, having a continuous monitoring plan enables you to see if your security controls are effective over time. While executing that plan can seem daunting,… Read More