New Research Report: What are security leaders saying about their security postures? View the Findings ➞

Ashok Sankar

Author's Posts

How a Unified Security Approach Can Address the Rising Costs of a Data Breach

IBM recently came out with its Cost of a Data Breach Report 2021. One of the main takeaways is the fact that the average total cost of a data breach increased from $3.86 million in 2020 to $4.24 million a year later. That’s a growth of 9.8%, the largest margin seen in seven years. The […]

Improved Detection and Hunt capabilities highlight latest release of GreyMatter

Today we’re introducing a new set of capabilities in our GreyMatter Open XDR-as-a-Service platform that allow security operations teams to improve detection, threat hunting and ease of management for the platform. These new features address some of the biggest challenges for security programs, most notability that in spite of investments in multiple tools, security operations […]

Overcoming Five Key Challenges in the Way of Effective Security Operations

According to a recent ReliaQuest survey, enterprises continue to deploy an assortment of security technologies across the network, email, endpoint devices, and the cloud despite an overwhelming number of existing investments, yet these tools are not able to proactively defend organizations against the evolving threat landscape. While individually providing valuable security telemetry, these tools are […]

Security Automation:  Let’s amplify, not replace people 

Security teams are plagued by two interrelated challenges – lack of resources and an ever-increasing set of tools that don’t speak the same language and require sophisticated skills to manage. Stories of analysts combing through disparate data, manually collating them to discover threats and many times, ending up with false positives, only to restart the process all over again are common. And this constant fire drill mode is […]

How to Achieve Best-in-Class Security Operations

Why you need outcome-driven Security Operations for today’s dynamic business and threat environment Digital transformation, hybrid or remote work, bring you own devices, shadow IT – business transformation is anything but static and cybersecurity teams are facing the brunt of it as guardians of the enterprise. How do security teams, already hampered with budget and […]

Re-thinking Security Operations in the New Threat Environment–And Why Open XDR-as-a-Service is Key to its Success

  Building an appropriate defense to meet the challenges of today’s complex and chaotic threat and risk environment requires organizations to rethink their cybersecurity. That includes evolving your Security Operations program to be more current, with access to the right mechanics and insights and the ability to focus on the security issues that impact your business most. Like all transformative processes, creating a best-in-class SOC takes time and commitment, but it’s well worth the investment. Fundamental to […]