Silence in the Logs: Are Organizations Missing Signs of a Breach? Jerry Mancini July 3, 2025 Logs from various sources can show a broad overview of activity but lack detail and nuance, providing an incomplete picture. Equipped with only this data, threat hunters can miss signs of a breach. Read More
Analytics at the source: A distributed approach to network security Jerry Mancini August 16, 2024 Taking a distributed approach to network security will ultimately enable IT organizations to more accurately identify vulnerabilities and threats. Read More