Attending Black Hat USA this year? Visit us in booth #1747 and begin to realize more value out of your existing security tools.
Joe Partlow

Joe Partlow

Author's Posts

Think Tank: CISOs Discuss Evolving Cybersecurity Landscape

“Hats off to the CISOs!”   These were the opening remarks Senior Principal Analyst and ESG Fellow Jon Oltsik used to greet the participants of our recent CISO Think Tank virtual event, a recognition appropriate for today’s security leaders who have faced extreme challenges and adversity over the past year alone due to COVID-19, not to mention the […]

ReliaQuest Named “Security Software Company of the Year” in 17th Annual Cyber Security Global Excellence Awards®

I’m excited to share that ReliaQuest was named “Security Software Company of the Year” in the 17th Annual Cyber Security Global Excellence Awards® . This award further validates the need for a unified SaaS-based threat detection, investigation, and response platform like GreyMatter that provides CISOs with assurance to advise the business and ensure resilience. Our open […]

ReliaQuest Wins 2020 CyberSecurity Breakthrough Award: GreyMatter Platform Honored for Second Consecutive Year

Today I’m honored to share that our GreyMatter platform has been recognized for the second year in a row by the 2020 CyberSecurity Breakthrough Awards. GreyMatter was awarded “SaaS Security Solution of the Year” — further validating the need for a unified SaaS security platform like ours that provides today’s CISOs with confidence in their security portfolio as the threat landscape continues […]

6 Reasons to Prioritize Cloud Visibility in Your Cloud Security Strategy

As the saying goes, “You can’t protect what you can’t see.” That bit of wisdom couldn’t be more on point when you’re talking about enterprise data in the cloud, which is multiplying by leaps and bounds. It’s hard enough to keep track of on-premise data along with associated threats and attempted breaches. When you’ve offloaded […]

In Security, All Logs Are Not Created Equal

Like a triage nurse, security professionals have to prioritize the data that will help them best identify problems and keep the organization, its data, and devices safe from intruders and cyberattacks. However, logging and monitoring all relevant events from across the IT environment can be challenging. For instance, some common log sources, such as servers, […]