Deepwatch
Insights Blog
Read original blogs from Deepwatch thought leaders and guests on topics including threat intelligence, SOC efficiency, and industry news.
Need Help? 855.303.3033 | Customer Login
Deepwatch
Read original blogs from Deepwatch thought leaders and guests on topics including threat intelligence, SOC efficiency, and industry news.
Filter Blog by:
4 MIN
Explore the lessons learned from CrowdStrike and Microsoft at Black Hat 2024, emphasizing the need for a holistic cybersecurity strategy to enhance organizational resilience.
4 MIN
Explore Deepwatch's innovative approach to Managed Detection and Response, offering eight new add-on modules that integrate cutting-edge technologies to improve data visibility, control, and precision response across your attack surface.
5 MIN
Learn about Deepwatch's journey to achieving ISO 27001 certification and the importance of maintaining the highest information security standards.
3 MIN
Discover strategies and insights from the Deepwatch BOTS Team as they share their experience in the .conf 2024 Boss of the SOC competition.
11 MIN
Learn why NIST's Cybersecurity Framework 2.0 emphasizes the need for a seperate "Govern" function and the impact of governance on security programs.
5 MIN
Discover the advantages of using Splunk UI and Dashboard Studio for building dashboards and visualizations in Splunk.
7 MIN
Discover the importance of open-source threat intelligence and how it can empower individuals and organizations to proactively enhance their security posture.
13 MIN
Discover the impact of SIEM market consolidation on MSSP/MDR customers and the future of security operations in 2024.
6 MIN
Shift focus from constant threats in cybersecurity to prioritizing protection. Embrace cyber resilience for a safer digital landscape with this blog post.
6 MIN
Learn about the elevated level partnership between Deepwatch and CrowdStrike, and the expanded capabilities it brings to the cybersecurity landscape.
4 MIN
From the SOC, Tim Grossner discusses securing or migrating away from VPNs after the recent rash of high profile attacks on multiple vendors.
6 MIN
Discover practical recommendations for optimizing vulnerability management tools and leverage APIs to enhance reporting capabilities.
4 MIN
Understand the parallels between the "Golden Hour" in medical emergencies and the response time in cybersecurity incidents, and the potential consequences of delayed incident response.
6 MIN
Learn how to safeguard the integrity of your supply chain with Deepwatch's cybersecurity expertise. Mitigate vulnerabilities and build a more cyber resilient future.
5 MIN
Gain insights into the zero-day vulnerability affecting Palo Alto Networks’ Global Project, including its impact, patch time, and cyber resilience recommendations.
3 MIN
Look beyond where buzzwords like automation and artificial intelligence (AI) and learn how Deepwatch empowers our trusty SOC analysts
4 MIN
Looking to deploy advanced EDR solutions? Leverage these 2024 best practices to ensure success in your Endpoint Detection & Response programs.
6 MIN
Don't fall for something that's not true. Discover why Deepwatch believes April Fools' Day is made to be a Cyber Resilience Holiday.
4 MIN
Deepwatch uncovers a new threat to victims searching for the 2023 Adobe Photoshop installer and getting a Monero cryptocurrency miner instead.
6 MIN
Discover how the Deepwatch and AWS solution effectively addresses today's cloud security challenges and boosts organization's cyber resilience.
3 MIN
Dive in with Deepwatch's Sr. Manager of Platform Operations and Engineering as he breaks down the engineering teams role in Splunk utilization.
3 MIN
Dive into the world of detection engineering and the use of the MITRE ATT&CK framework within the SOC with Deepwatch's Director of Threat Operations.
Deepwatch dives into the revolution in SOC data through the introduction of an Open Security Data Architecture to address key industry problems.
6 MIN
A TLDR on what security leaders need to know about the ConnectWise and ScreenConnect vulnerabilities, including recommendations beyond patching
5 MIN
Get insights on all things AWS detection engineering, including CloudTrail logs & alerting, best use of tools, detection use cases, & configurations
6 MIN
Get guidance from one of the largest SOCs in the business on key components to building a resilient security operations program
11 MIN
Adversaries are using popular domains to bypass Secure Email Gateway (SEG) protections. Learn how to leverage mature SIEM detections for solid defense
4 MIN
Zloader is back again. Get details of their latest variant (version 2.0.0.0), with insight on the inner workings of the threat, indicators, and tooling
14 MIN
Get the pertinent facts on Ivanti's two recent zero-day CVEs and know what actions you can take while patches are still being rolled out
3 MIN
Data leak sites listed over 2,400 victims in 2023. Read for a full analysis on groups, impact to industries and geography, and how to avoid falling victim
10 MIN
Get insights on the state of ransomware in 2023, its evolution and new threats, along with predictions for the landscape in 2024
9 MIN
The FBI has halted BlackCat/ALPHV on the dark web and provided a free, effective ransomware decryptor. Read for key lessons from this takedown
4 MIN
Deepwatch breaks down hyperautomation in cybersecurity - what it is, examples, and benefits. Learn how it's bringing harmony to dissonance
4 MIN
Understand the crucial elements of vulnerability management maturity and how they play into building cyber resilience
3 MIN
Microsoft Defender logs can be perplexing and convoluted. Hear from Deepwatch engineers as they break down this logging mechanism
4 MIN
Deepwatch's VP, Security & Content Strategy reveals key lessons from the recent MGM & Caesars cyber attacks that you can apply on your journey to cyber resilience
7 MIN
Uncover insights from recent security breaches, the business impact, and how a focus on cyber resilience could help your organization avoid the same
5 MIN
Get clear insights on what plus addressing is, how it enhances cyber awareness and resiliency, and how it can help reduce phishing attacks
3 MIN
As the attack landscape expands & grows in complexity, proactive defense is not enough. Learn why cyber resilience is imperative to organizations today
6 MIN
Get insights on Cisco's acquisition of Splunk, its impact on customers & the cybersecurity industry as a whole from CEO of Deepwatch, a key Splunk partner
5 MIN
The role of a security leader is not to prevent every attack. Discover how cyber resilience enables teams to respond competently when incidents occur
6 MIN
As generative AI tools emerge, Deepwatch's Michael Mayes breaks down moral and ethical considerations, taking lessons from other emerging tech
8 MIN
SecOps outsourcing is more than just a reaction to a skills shortage. Unlock the key benefits it can have on your organizations long-term success and security
4 MIN
Explore the observations, metrics, trends and forecast the Deepwatch ATI team has uncovered in their 2023 Threat Report.
4 MIN
Financial services organizations are faced with continuous cyber attacks and increased challenges. Discover the top 8 threats today
2 MIN
Understand the most damaging cyber attacks security teams should look for to reduce risk this holiday shopping season
8 MIN
Take and apply these vulnerability management best practices and future proof your organization from threats
5 MIN
Stay prepared & continue advancing your cybersecurity efforts with insight on the issues predicted to arise in 2023
7 MIN
Discover how healthcare organizations can bridge the cybersecurity skills gap amongst an ever changing landscape
4 MIN
New vulnerabilities are discovered every day. Know when it's time to improve your tech stack, hire, or leverage managed services
6 MIN
Stop living with extortion. Understand how to better protect your organization from ransomware with managed detection and response
4 MIN
Dive in as we breakdown Uber CISO, Joe Sullivan’s conviction, the pressures CISOs are under today and the mindset shift that needs to happen
6 MIN
Any company can be breached by an employee making a poor security choice. Get the background on Uber's security breach and lessons learned
7 MIN
Privacy and security extend beyond HIPAA. Understand how to effectively mature SecOps in healthcare to protect patient care
2 MIN
Building and maintaining a modern security operations center (SOC) is a dynamic and expensive endeavor. Know the hidden costs to take into account
4 MIN
As economic concerns grow, security teams with limited resources look to Deepwatch Managed Security Solutions to optimize budgets, extend coverage, and reduce risk
4 MIN
Security Operations is no island and your team can’t secure everything by themselves. Cybersecurity is a team sport, and everyone needs to be involved. Your security operations team needs to collaborate with other groups and departments to understand priorities, goals, and objectives
4 MIN
Read about healthcare cybersecurity risks: budget constraints, targeted healthcare ransomware, staffing and skills gaps, and more
6 MIN
Ransomware attacks are now a top concern for CISOs and board rooms alike. Understand how to reduce risks with managed MDR
5 MIN
Vulnerability Management is a core domain within the Security program. Read why a strong vulnerability management program is required to help you advance your defense-in-depth strategy to ensure threat actors are detected and removed fast
7 MIN
Managing security risk today requires a proactive, defense-in-depth approach; threat hunting by expert threat hunters gives organizations 3 distinct advantages to better detect and respond to threats
4 MIN
Organizations need managed detection and response (MDR) as a fast and reliable solution to overcome business risk associated with the cybersecurity skills gap
3 MIN
Deepwatch is actively working on risk mitigation for CVE-2021-44228, the actively exploited vulnerability in Apache Log4j, dubbed “Log4Shell.” Read the latest on what’s happening and what you can do to patch, protect, and defend your security environment from Log4j exploits
12 MIN
Cybersecurity reporting can be challenging when reporting to Executive Leadership and the Board. Learn how to use these Security Operation detection and response metrics and the language of risk management to convey results and explain budget requests
6 MIN
Deepwatch has released Forrester conducted analysis on the Total Economic Impact of their Managed Detection and Response services, including financial analysis on Return on Investment and the positive impact of Deepwatch MDR on cybersecurity investments. Read the three highlights and download the report today
2 MIN
Watch deepwatch experts 'walk the talk' and see how our security-first culture fuels improvements as innovation and cybersecurity connect
5 MIN
Learn how to defend against the risk of Sensitive Data Exposure, which is #3 on the OWASP List of Top 10 Risks to Web Applications
6 MIN
Read more about how to defend against the risk of broken authentication, which is #2 on the OWASP List of Top 10 Risks to Web Applications
9 MIN
Explore four ways to faster results when you launch or upgrade your SIEM (Security Information and Event Management) system
2 MIN
A logging strategy can help you identify the right data sources you need to best monitor your environment and see threats faster. Learn how to create a logging strategy to advance your threat detection and incident response in security operations
10 MIN
The term “kill chain” comes from a military concept that uses stages to outline the structure of an attack. “Breaking” the opponent's kill chain refers to the ability to block an attack at any stage
5 MIN
What is Threat Hunting? Learn the four steps to conduct a successful threat hunt in Splunk
9 MIN
Explore the top 10 take-aways from the Colonial Pipeline ransomware attack that we must all take to heart
9 MIN
We break down the anatomy of a ransomware attack including the stages of an attack and how to better detect and mitigate ransomware
6 MIN
Interested in learning the roles and responsibilities of a CISO? Discover more details behind the everyday tasks of a CISO
3 MIN
Discover what SecOps is and how your business can maximize its effectiveness. Learn more and get started protecting your business with Deepwatch
5 MIN
Learn more about top network security issues facing the cybersecurity industry today and how you can prevent them
7 MIN
Find network security best practices to implement now in order to start protecting your business information
4 MIN
Learn how to defend against and identify phishing emails to protect your device, your network and your company
6 MIN
Interested in implementing a stronger cybersecurity foundation in your business? Get started with these basic tips for cybersecurity today
6 MIN
Learn more about the Splunk Cloud and deepwatch partnership and the industry-leading MDR capabilities it brings for customers
5 MIN
Do you know what the difference between MDR and MSSP services are? Read more as Deepwatch uncovers the specifics behind MDRs vs. MSSPs
6 MIN
Wow, is it over yet? Did we make it? Let's talk about what 2020 meant from an information security perspective
5 MIN
What is MDR? Learn about the basics of MDR, how its different from MSSP, and how to get started with the cyber experts at Deepwatch
4 MIN
Read more about cyber threat intelligence and how it can help benefit your business. Discover more with the cybersecurity experts at Deepwatch today
6 MIN
What is CIA in cybersecurity? Learn more about CIA in cybersecurity, and how you can use CIA to benefit your business
6 MIN
Interested in learning cybersecurity terms? Read more about cybersecurity terminology and keep yourself up-to-date on the latest in cybersecurity
6 MIN
What is patch management? Learn about it, why it's important and how often it should be performed on your business
7 MIN
Why aren't you outsourcing your cybersecurity operations? Discover the benefits and misconceptions about outsourcing your cybersecurity team
7 MIN
Discover work from home best practices for security practitioners with Bill Bernard from Deepwatch. Learn how to find success while working from home today
5 MIN
Let's Talk
Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.