Shailesh Athalye November 16, 2020January 27, 2021 - 9 min read A Modern Approach to Risk Management and Compliance
Juan C. Perez October 17, 2018September 6, 2020 - 7 min read Threat Hunting: Adoption, Expertise Grow, but Work Remains
Tim White June 5, 2018September 6, 2020 - 7 min read GDPR Is Here: Put File Integrity Monitoring in Your Toolbox
Tim White February 6, 2018September 6, 2020 - 6 min read If You Think File Integrity Monitoring is Boring, Think Again
Juan C. Perez December 7, 2017September 6, 2020 - 9 min read Implementing the CIS 20 Critical Security Controls: Make Your InfoSec Foundation Rock Solid
Juan C. Perez December 4, 2017September 6, 2020 - 8 min read Implementing the CIS 20 Critical Security Controls: Delving into More Sophisticated Techniques
Juan C. Perez November 28, 2017September 6, 2020 - 8 min read Implementing the CIS 20 Critical Security Controls: Building Upon Foundational Cyber Hygiene