SOC Talk: Conversations from the TrenchesIn each of these interactive discussions, you’ll hear cybersecurity experts and members of the ReliaQuest Security Operations team discuss challenges, trending security topics and share solutions for achieving best in class security operations.
As the saying goes, “You can’t protect what you can’t see.” That bit of wisdom couldn’t be more on point when you’re talking about enterprise data in the cloud, which is multiplying by leaps and bounds. It’s hard enough to keep track of on-premise data along with associated threats and attempted breaches. When you’ve offloaded […]
“Hats off to the CISOs!” These were the opening remarks Senior Principal Analyst and ESG Fellow Jon Oltsik used to greet the participants of our recent CISO Think Tank virtual event, a recognition appropriate for today’s security leaders who have faced extreme challenges and adversity over the past year alone due to COVID-19, not to mention the […]
I’m excited to share that ReliaQuest was named “Security Software Company of the Year” in the 17th Annual Cyber Security Global Excellence Awards® . This award further validates the need for a unified SaaS-based threat detection, investigation, and response platform like GreyMatter that provides CISOs with assurance to advise the business and ensure resilience. Our open […]
Today I’m honored to share that our GreyMatter platform has been recognized for the second year in a row by the 2020 CyberSecurity Breakthrough Awards. GreyMatter was awarded “SaaS Security Solution of the Year” — further validating the need for a unified SaaS security platform like ours that provides today’s CISOs with confidence in their security portfolio as the threat landscape continues […]
Like a triage nurse, security professionals have to prioritize the data that will help them best identify problems and keep the organization, its data, and devices safe from intruders and cyberattacks. However, logging and monitoring all relevant events from across the IT environment can be challenging. For instance, some common log sources, such as servers, […]