• Why ReliaQuest We’ve run SOCs. We know the problems. And we’ve got the solutions.
    • Our Approach We solve problems differently to get CISOs the consistent outcomes they need.
    • Open XDR EDR, NDR, MDR, XDR, Open XDR…we don’t care what you call it. We care about making security possible.
    • Customers We are committed to helping our customers strengthen their security operations.
    • Integration Partners Get operational integrations for unified visibility, detection investigation and response.
    • WHY RELIAQUEST?

    • Reduce Complexity What happens when you get operational integrations instead of app stores and plug ins? Truly unified visibility.
    • Detection, Investigation Response What if you didn’t have to deal with duplicates and false positives? Find out, with ReliaQuest GreyMatter.
    • Force Multiply Security Teams When the mundane and repetitive are managed, you can focus your team where their expertise matters.
    • Continuous Measurement Consistent, business-relevant metrics to drive ROI, alignment and accelerate your goals.
    • Features ReliaQuest GreyMatter is a comprehensive platform giving you visibility to detect, investigate and respond faster.
    • RELIAQUEST GREYMATTER

    • Cloud Security You might have multiple clouds, tools and locations. But you only need one platform for unified visibility, detection and response: ReliaQuest GreyMatter.
    • Security Automation More of your mind, less of your time. Reduce noise by 89%, speed MTTR and improve analyst quality of life.
    • Security Operations We help you operationalize security. Any tech stack. Any size team.
    • Phishing
    • Threat Hunting
    • About ReliaQuest We bring our best attitude, energy and effort to everything we do, every day.
    • Careers Security is a team sport. Join our world-class team.
    • Events We wish we could say we’ll see you in person…until then join us online for engaging conversations.
    • Contact ReliaQuest What’s on your mind?
    • Newsroom Press releases and trending articles to stay in the know.
      • Media Coverage
      • Press Releases
    • JOIN OUR TEAM!

    • Blog From the trendy to the fun to tactical how-tos. Our blog is sure to have something for you.
    • Resources Learn more about security operations best practices, recent threat research or emerging trends like Open XDR.
      • Data Sheets
      • Guides
      • Infographics
      • Podcasts
      • Research Reports
      • Webinars
      • White Papers
      • Videos
    • LATEST BLOG POST

    • Security OperationsMarch 18, 2021

      New IDG and ReliaQuest Research Finds Many Security Teams at a Critical Tipping Point with “Security Tech Sprawl”

    • FEATURED RESOURCES

    • White Papers

      Securing the Cloud
    • Guides

      The Tactical Guide to Securing Data on Cloud Platforms in 2021
    • Webinars

      The CISO’s Guide to Metrics that Matter to the Board
  • Request Info

Topic
Detection and Response

Sacking Cybercriminals and Fraudsters at Super Bowl LV

Company News & Events, Detection and Response February 22, 2021

Sacking Cybercriminals and Fraudsters at Super Bowl LV

The Super Bowl presents a ton of opportunities for cyber criminals to exploit, both through the target–rich environment surrounding the event itself as well as social engineering attacks that take advantage of the hype.

Security Alert Fatigue? False Positives? Common Problems in Threat Detection And How to Fix Them

Detection and Response, Security Operations February 12, 2021

Security Alert Fatigue? False Positives? Common Problems in Threat Detection And How to Fix Them

If your team is suffering from security alert fatigue, too many false positives, and an overall reactive posture, you’re not alone. Organizations are continuing to invest in a growing suite of cyber security tools, complicating security operations, overwhelming teams, and negatively impacting threat detection. According to a 451 Research Report, 43% of enterprises are unable to act […]

Best Practices for Monitoring and Investigating AWS Events

Cloud Security, Detection and Response December 17, 2020

Best Practices for Monitoring and Investigating AWS Events

Cloud computing is a resource that is becoming more affordable, efficient, and widespread in today’s enterprise environments. Having a well-hardened environment will thwart most attacks on your organization’s assets and resources, but what happens when an S3 bucket that your team created years ago was misconfigured along the way and auditing of the security configuration […]

Detect Solorigate and SUNBURST Attacker Techniques with the MITRE ATT&CK Framework—We’ll Get You Started

Detection and Response, Threat Intelligence December 16, 2020

Detect Solorigate and SUNBURST Attacker Techniques with the MITRE ATT&CK Framework—We’ll Get You Started

As folks are continuing to work to address the Solorigate/ SUNBURST compromise, our team has been mapping the tactics and techniques used by the attackers to the MITRE ATT&CK framework, and building detection content to deploy for our customers.  If you haven’t already, please read this blog first to get the basics. What follows is […]

How to Get the Most out of Your Security Monitoring with the Cyber Kill Chain Model

Detection and Response, Increasing Visibility, Security Operations November 20, 2020

How to Get the Most out of Your Security Monitoring with the Cyber Kill Chain Model

In our personal lives, many of us try to get the most out of a tank of gasoline – waiting until the red indicator shines bright and we finally have to stop at a gas station to fill our tank. This mindset extends to many aspects of our lives, both personally and professionally.  For many […]

On the Hook: A Defense-in-Depth Approach to Mitigating Phishing Attacks

Detection and Response, Security Operations October 22, 2020

On the Hook: A Defense-in-Depth Approach to Mitigating Phishing Attacks

Purpose-built security tools are designed to solve for the ever-evolving threat landscape led by APTs, Nation-States, and Hacktivists, but is your organization accounting for the internal threats posed by your authorized users? Most phishing attacks require help from the end user to be successful Source: Peter Broelman The latest Verizon Annual Data Breach Investigations Report […]

Stop the Spread of Malware: Tips for Preventing, Detecting, and Analyzing Malware in an Enterprise Environment

Detection and Response September 9, 2020

Stop the Spread of Malware: Tips for Preventing, Detecting, and Analyzing Malware in an Enterprise Environment

In today’s world, the threat of a malware infection gaining a foothold in an enterprise network is a top concern. An extensive infection could mean countless hours spent handling the recovery and remediation of impacted devices and mitigating the initial gap in security posture. In simplest terms, preventing an infection in the first place is […]

Top 3 Reasons to Alert Based on the Cyber Kill Chain Model

Detection and Response, Increasing Visibility, Security Operations August 6, 2020

Top 3 Reasons to Alert Based on the Cyber Kill Chain Model

Picture this – It’s 8 AM on Monday and you’re sitting at your desk with a fresh cup of coffee, ready to start a new week. You log in to your workstation, hopeful that your team can kick-off the proactive DNS threat hunt you’ve planned out. Once you’ve opened the usual web browser tabs and […]

Healthcare Industry Spotlight: Tips for Detecting and Investigating Common Insider Threats

Detection and Response June 30, 2020

Healthcare Industry Spotlight: Tips for Detecting and Investigating Common Insider Threats

In the healthcare industry, insider threats typically take the form of an authorized individual abusing access to resources such as healthcare networks or electronic healthcare systems. In order to protect the business from unauthorized access, disclosure, modifications, or destruction, you need visibility into your information and information systems. A recent example of an insider threat […]

No results

© 2021 ReliaQuest, LLC All Rights Reserved

Get in Touch

  • Share on LinkedIn
  • Follow us on Twitter
  • Follow us on Facebook
  • Follow us on Youtube

[email protected]

777 South Harbour Island Blvd,
Suite 500
Tampa, FL 33602

  • Why ReliaQuest?
  • Open XDR
  • Our Approach
  • Why ReliaQuest
  • Customers
  • Integration Partners
  • Platform Capabilities
  • Reduce Complexity
  • Detection Investigation Response
  • Force Multiply Security Teams
  • Continuous Measurement
  • Features
  • Company
  • About ReliaQuest
  • Careers
  • Events
  • Contact ReliaQuest
  • Media Coverage
  • Press Releases
  • Privacy Policy
  • Insights
  • Blog
  • Resources

A video is being shown