Our next-gen architecture is built to help you make sense of your ever-growing data. Watch a 4-min demo video!

Security

What is a Security Whitelist?
6 min

What is a Security Whitelist?

In April 2022 alone, there were 14.3m records breached due to 80 significant security incidents. These incidents make up a complex, shifting landscape of cyberattacks that…

What is the Most Vulnerable Data My Company Holds?
8 min

What is the Most Vulnerable Data My Company Holds?

Data security is on every priority list in 2022. With the frequency of breaches never higher, many businesses assess their situation and ask cybersecurity questions. With…

What is Red Teaming in Cyber Security? The Complete Guide
12 min

What is Red Teaming in Cyber Security? The Complete Guide

Red teaming explained Red teaming is the practice of asking a trusted group of individuals to launch an attack on your software or your organization so…

Splunk Indexer Vulnerability: What You Need to Know
5 min

Splunk Indexer Vulnerability: What You Need to Know

A new vulnerability, CVE-2021-342 has been discovered in the Splunk indexer component, which is a commonly utilized part of the Splunk Enterprise suite. We’re going to…

How to Tell if You Were Attacked in the Recent Okta Security Breach
5 min

How to Tell if You Were Attacked in the Recent Okta Security Breach

Today, Okta, a leading enterprise identity and access management firm, reported that it had launched an inquiry after the LAPSUS$ hacking group posted screenshots on Telegram….

5 Cybersecurity Tools to Safeguard Your Business
6 min

5 Cybersecurity Tools to Safeguard Your Business

With the exponential rise in cybercrimes in the last decade, cybersecurity for businesses is no longer an option — it’s a necessity. Fuelled by the forced…

IoT Security: How Important are Logs for System?
5 min

IoT Security: How Important are Logs for System?

IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a…

Cyber Security in 2021 – What Happened?
9 min

Cyber Security in 2021 – What Happened?

2021 was quite a year. Some things changed, and some things very much stayed the same. The world of cyber security was not immune to this…

Optimized Traffic Mirroring Examples – Part 2
9 min

Optimized Traffic Mirroring Examples – Part 2

In a previous post, we looked at an example of a fictional bookstore company and recommended mirroring strategies for that specific scenario. In this post, we’ll…

Where Modern Observability
and Financial Savvy Meet.