Deepwatch
Insights Blog
Read original blogs from Deepwatch thought leaders and guests on topics including threat intelligence, SOC efficiency, and industry news.
Need Help? 855.303.3033 | Contact Us | Customer Login
Deepwatch Announces its NEXA™ Agentic AI Ecosystem
Deepwatch
Read original blogs from Deepwatch thought leaders and guests on topics including threat intelligence, SOC efficiency, and industry news.
Filter Blog by:

5 MIN

Agentic AI is transforming the SOC. See how MDR 3.0 shifts to operational autonomy with reasoning agents, accelerating risk reduction while retaining human oversight.
11 MIN

Attackers are poisoning package managers (npm, PyPI) to spread Trojans through trusted CI/CD pipelines. Learn the 8 distinct behavioral patterns—from version anomalies to callback trails—that bypass traditional security tools and reveal sophisticated supply chain attacks.
13 MIN

Recent NPM supply chain attacks and agentic reconnaissance remind us to master the basics. Learn how to build a robust, multilayered cyber defense strategy, using the OSI Model and Least Privilege to protect your 'crown jewels' from novel threats.
14 MIN

Discover why visibility alone isn't enough. Deepwatch Takedown Services close the loop with rapid removal of threats, enabling proactive defense and compliance assurance.
4 MIN

AI is now a weapon. Explore how cybercriminals use it for sophisticated attacks, from deepfake scams to advanced ransomware, and find out how to leverage AI to defend your organization.
7 MIN

Elevate your security posture. The Deepwatch Guardian MDR Platform™ and Microsoft Sentinel combine expert threat hunting with cloud-native SIEM & SOAR capabilities for resilient protection.
5 MIN

Learn the five best practices for Continuous Threat Exposure Management (CTEM) and how Deepwatch's CRE platform helps you find, prioritize, and remediate cyber threats.
4 MIN

Deepwatch’s Dynamic Risk Scoring cuts alert fatigue by over 90% by prioritizing real threats with adaptive scoring, automation, and SLA-backed response—learn how it works.
5 MIN

More logs don’t mean better security. Discover how to turn raw telemetry into meaningful detection coverage using CRE and Deepwatch MDR.
2 MIN

Supercharge your security operations with Deepwatch Continuous Threat Exposure Management (CTEM). Get unified risk metrics, enhanced automation, and full visibility to stop threats before they hit.
4 MIN

Too many alerts, not enough clarity? Learn how context-aware, risk-based detection transforms security from noisy to actionable.
3 MIN

Stay ahead of summer cybersecurity threats. Learn how to mitigate risks from Windows 10 EOL, new Windows 11 features, and Microsoft Edge updates to secure your organization's digital environment.
5 MIN

Supercharge your Splunk investment with Deepwatch MDR. Our managed detection and response platform provides 24/7 expert coverage, automated response, and dynamic risk scoring—all within your existing Splunk environment.
4 MIN

Learn how you can enhance your MDR with Deepwatch Dark Web Monitoring and Response. Get proactive threat intelligence and automated responses to stop attacks before they start.
4 MIN

New CISOs often inherit blind spots in telemetry. Discover the 3 most common gaps and how to close them fast—without a rip-and-replace overhaul.
3 MIN

Discover why top security teams are choosing Deepwatch’s Dynamic Risk Scoring platform—cut alert fatigue, enhance SLA-backed response, and boost SOC performance with real-time threat prioritization.
3 MIN

Introducing the Deepwatch Guardian MDR Platform: Precision MDR with human expertise and AI for 24/7 proactive cybersecurity and threat protection.
3 MIN

Learn how new CISOs can turn security complexity into board-level clarity in their first 100 days. Practical tips for visibility, metrics, and influence.
3 MIN

Discover how Deepwatch achieves 432% MDR ROI with automation, legacy cost elimination, and strategic threat response for enterprise security teams.
5 MIN

Discover how Deepwatch’s Dynamic Risk Scoring uses real-time, contextual analysis to prioritize cyber threats and cut false positives by up to 90%—a smarter, faster way to secure your organization.
3 MIN

New CISOs must rapidly uncover blind spots. Learn how visibility fast-tracks trust and operational clarity in your first 30 days.
3 MIN

Elevate your security with Deepwatch MDR and Google SecOps. Get 24/7 expert-led, AI-enabled threat detection, rapid response, and comprehensive visibility.
4 MIN

Explore how preemptive MDR proves risk reduction, lowers premiums, and fulfills requirements for cyber insurance and financial guarantees.
4 MIN

In 2025, building a 24/7 SOC is burning out teams and breaking budgets. Discover how leading CISOs are shifting from coverage to resilience—and why the old model no longer scales.
3 MIN

As cyber threats become increasingly sophisticated, the integration of identity management, human risk factors, and MDR has emerged as a defining trend.
4 MIN

Explore how Deepwatch delivers end-to-end MDR services built on visibility, transparency, and regulatory compliance for enterprise resilience.
4 MIN

Discover how Preemptive MDR transforms threat response by predicting and preventing attacks before they strike. Learn how Deepwatch leads this evolution.
4 MIN

Learn how top CISOs approach board-level cybersecurity reporting with risk-focused metrics, exposure-based prioritization, and clear narratives. Go beyond alerts—report what matters.
6 MIN

Discover 7 ways CISOs can evolve from a defensive posture to strategic leaders who drive business resilience. Learn to think like a strategist, future-proof your security foundation, and communicate value to the board.
4 MIN

Deepwatch redefines MDR with real-time insights, seamless integrations, and AI-powered threat exposure management – outpacing legacy MDR providers.
5 MIN

Discover how the future of enterprise MDR will be defined by AI-driven innovation, deep integration, industry specialization, and expert-led security.
6 MIN

Splunk detects threats, but 24/7 coverage is the key. Gaps cause alert fatique, chaos and exposure. Explore options to improve threat detection and response.
3 MIN

Alert fatique, dirty logs, useless reports dragging you down? Learn how to fix it in Splunk and get real value from your SIEM.
5 MIN

Deepwatch Dynamic Risk Scoring engine addresses alert overload and static risk models. Learn how our platform delivers real-time, adaptive security for enterprises.
5 MIN

Stretched security team? Missed threats? Need 24/7 coverage? Leverage your Splunk with MDR for control, outcomes, and peace of mind.
4 MIN

AI Phishing scams are on the rise this April Fools' Day. Beware of sophisticated email & texts mimicking trusted sources. Stay vigilant & protect your data.
3 MIN

Discover how Deepwatch's acquisition of Dassana revolutionizes security operations by integrating AI-powered risk management and threat intelligence, enabling proactive threat prevention and enhanced visibility for CISOs.
4 MIN

Discover how to transform your organization's cyber architecture from conceptual to practical with preemptive strategies that enhance security and resilience. Read more in Volume 2 of A Cyber Architect’s Playbook.
4 MIN

Discover the evolving role of the CISO as a Cyber Architect, bridging cybersecurity with business resilience and strategy for a stronger organization.
6 MIN

Discover key insights from Black Hat 2024 on AI/ML developments and rising data security concerns. Learn how to shape proactive security strategies for the future in this continuation of our reflections.
4 MIN

Explore the lessons learned from CrowdStrike and Microsoft at Black Hat 2024, emphasizing the need for a holistic cybersecurity strategy to enhance organizational resilience.
4 MIN

Learn about Deepwatch's journey to achieving ISO 27001 certification and the importance of maintaining the highest information security standards.
3 MIN

Discover strategies and insights from the Deepwatch BOTS Team as they share their experience in the .conf 2024 Boss of the SOC competition.
11 MIN

Learn why NIST's Cybersecurity Framework 2.0 emphasizes the need for a seperate "Govern" function and the impact of governance on security programs.
5 MIN

Discover the advantages of using Splunk UI and Dashboard Studio for building dashboards and visualizations in Splunk.
7 MIN

Discover the importance of open-source threat intelligence and how it can empower individuals and organizations to proactively enhance their security posture.
13 MIN

Discover the impact of SIEM market consolidation on MSSP/MDR customers and the future of security operations in 2024.
6 MIN

Shift focus from constant threats in cybersecurity to prioritizing protection. Embrace cyber resilience for a safer digital landscape with this blog post.
6 MIN

Learn about the elevated level partnership between Deepwatch and CrowdStrike, and the expanded capabilities it brings to the cybersecurity landscape.
4 MIN

From the SOC, Tim Grossner discusses securing or migrating away from VPNs after the recent rash of high profile attacks on multiple vendors.
6 MIN

Discover practical recommendations for optimizing vulnerability management tools and leverage APIs to enhance reporting capabilities.
4 MIN

Understand the parallels between the "Golden Hour" in medical emergencies and the response time in cybersecurity incidents, and the potential consequences of delayed incident response.
6 MIN

Learn how to safeguard the integrity of your supply chain with Deepwatch's cybersecurity expertise. Mitigate vulnerabilities and build a more cyber resilient future.
5 MIN

Gain insights into the zero-day vulnerability affecting Palo Alto Networks’ Global Project, including its impact, patch time, and cyber resilience recommendations.
3 MIN

Look beyond where buzzwords like automation and artificial intelligence (AI) and learn how Deepwatch empowers our trusty SOC analysts
4 MIN

Looking to deploy advanced EDR solutions? Leverage these 2024 best practices to ensure success in your Endpoint Detection & Response programs.
6 MIN

Don't fall for something that's not true. Discover why Deepwatch believes April Fools' Day is made to be a Cyber Resilience Holiday.
4 MIN

Deepwatch uncovers a new threat to victims searching for the 2023 Adobe Photoshop installer and getting a Monero cryptocurrency miner instead.
6 MIN

Discover how the Deepwatch and AWS solution effectively addresses today's cloud security challenges and boosts organization's cyber resilience.
3 MIN

Dive in with Deepwatch's Sr. Manager of Platform Operations and Engineering as he breaks down the engineering teams role in Splunk utilization.
3 MIN

Dive into the world of detection engineering and the use of the MITRE ATT&CK framework within the SOC with Deepwatch's Director of Threat Operations.

A TLDR on what security leaders need to know about the ConnectWise and ScreenConnect vulnerabilities, including recommendations beyond patching
5 MIN

Get insights on all things AWS detection engineering, including CloudTrail logs & alerting, best use of tools, detection use cases, & configurations
6 MIN

Get guidance from one of the largest SOCs in the business on key components to building a resilient security operations program
11 MIN

Adversaries are using popular domains to bypass Secure Email Gateway (SEG) protections. Learn how to leverage mature SIEM detections for solid defense
4 MIN

Zloader is back again. Get details of their latest variant (version 2.0.0.0), with insight on the inner workings of the threat, indicators, and tooling
14 MIN

Get the pertinent facts on Ivanti's two recent zero-day CVEs and know what actions you can take while patches are still being rolled out
3 MIN

Data leak sites listed over 2,400 victims in 2023. Read for a full analysis on groups, impact to industries and geography, and how to avoid falling victim
10 MIN

Get insights on the state of ransomware in 2023, its evolution and new threats, along with predictions for the landscape in 2024
9 MIN

The FBI has halted BlackCat/ALPHV on the dark web and provided a free, effective ransomware decryptor. Read for key lessons from this takedown
4 MIN

Deepwatch breaks down hyperautomation in cybersecurity - what it is, examples, and benefits. Learn how it's bringing harmony to dissonance
4 MIN

Understand the crucial elements of vulnerability management maturity and how they play into building cyber resilience
3 MIN

Microsoft Defender logs can be perplexing and convoluted. Hear from Deepwatch engineers as they break down this logging mechanism
4 MIN

Deepwatch's VP, Security & Content Strategy reveals key lessons from the recent MGM & Caesars cyber attacks that you can apply on your journey to cyber resilience
7 MIN

Uncover insights from recent security breaches, the business impact, and how a focus on cyber resilience could help your organization avoid the same
5 MIN

Get clear insights on what plus addressing is, how it enhances cyber awareness and resiliency, and how it can help reduce phishing attacks
3 MIN

As the attack landscape expands & grows in complexity, proactive defense is not enough. Learn why cyber resilience is imperative to organizations today
6 MIN

Get insights on Cisco's acquisition of Splunk, its impact on customers & the cybersecurity industry as a whole from CEO of Deepwatch, a key Splunk partner
5 MIN

The role of a security leader is not to prevent every attack. Discover how cyber resilience enables teams to respond competently when incidents occur
6 MIN

As generative AI tools emerge, Deepwatch's Michael Mayes breaks down moral and ethical considerations, taking lessons from other emerging tech
8 MIN

SecOps outsourcing is more than just a reaction to a skills shortage. Unlock the key benefits it can have on your organizations long-term success and security
4 MIN

Explore the observations, metrics, trends and forecast the Deepwatch ATI team has uncovered in their 2023 Threat Report.
4 MIN

Financial services organizations are faced with continuous cyber attacks and increased challenges. Discover the top 8 threats today
2 MIN

Understand the most damaging cyber attacks security teams should look for to reduce risk this holiday shopping season
8 MIN

Take and apply these vulnerability management best practices and future proof your organization from threats
5 MIN

Stay prepared & continue advancing your cybersecurity efforts with insight on the issues predicted to arise in 2023
7 MIN

Discover how healthcare organizations can bridge the cybersecurity skills gap amongst an ever changing landscape
4 MIN

New vulnerabilities are discovered every day. Know when it's time to improve your tech stack, hire, or leverage managed services
6 MIN

Stop living with extortion. Understand how to better protect your organization from ransomware with managed detection and response
4 MIN

Dive in as we breakdown Uber CISO, Joe Sullivan’s conviction, the pressures CISOs are under today and the mindset shift that needs to happen
6 MIN

Any company can be breached by an employee making a poor security choice. Get the background on Uber's security breach and lessons learned
7 MIN

Privacy and security extend beyond HIPAA. Understand how to effectively mature SecOps in healthcare to protect patient care
2 MIN

Building and maintaining a modern security operations center (SOC) is a dynamic and expensive endeavor. Know the hidden costs to take into account
4 MIN

As economic concerns grow, security teams with limited resources look to Deepwatch Managed Security Solutions to optimize budgets, extend coverage, and reduce risk
4 MIN

Security Operations is no island and your team can’t secure everything by themselves. Cybersecurity is a team sport, and everyone needs to be involved. Your security operations team needs to collaborate with other groups and departments to understand priorities, goals, and objectives
4 MIN

Read about healthcare cybersecurity risks: budget constraints, targeted healthcare ransomware, staffing and skills gaps, and more
6 MIN

Ransomware attacks are now a top concern for CISOs and board rooms alike. Understand how to reduce risks with managed MDR
5 MIN

Vulnerability Management is a core domain within the Security program. Read why a strong vulnerability management program is required to help you advance your defense-in-depth strategy to ensure threat actors are detected and removed fast
7 MIN

Managing security risk today requires a proactive, defense-in-depth approach; threat hunting by expert threat hunters gives organizations 3 distinct advantages to better detect and respond to threats
4 MIN

Organizations need managed detection and response (MDR) as a fast and reliable solution to overcome business risk associated with the cybersecurity skills gap
3 MIN

Deepwatch is actively working on risk mitigation for CVE-2021-44228, the actively exploited vulnerability in Apache Log4j, dubbed “Log4Shell.” Read the latest on what’s happening and what you can do to patch, protect, and defend your security environment from Log4j exploits
12 MIN

Deepwatch has released Forrester conducted analysis on the Total Economic Impact of their Managed Detection and Response services, including financial analysis on Return on Investment and the positive impact of Deepwatch MDR on cybersecurity investments. Read the three highlights and download the report today
2 MIN

Watch deepwatch experts 'walk the talk' and see how our security-first culture fuels improvements as innovation and cybersecurity connect
5 MIN

Learn how to defend against the risk of Sensitive Data Exposure, which is #3 on the OWASP List of Top 10 Risks to Web Applications
6 MIN

Read more about how to defend against the risk of broken authentication, which is #2 on the OWASP List of Top 10 Risks to Web Applications
9 MIN

Explore four ways to faster results when you launch or upgrade your SIEM (Security Information and Event Management) system
2 MIN

A logging strategy can help you identify the right data sources you need to best monitor your environment and see threats faster. Learn how to create a logging strategy to advance your threat detection and incident response in security operations
10 MIN

The term “kill chain” comes from a military concept that uses stages to outline the structure of an attack. “Breaking” the opponent's kill chain refers to the ability to block an attack at any stage
5 MIN

What is Threat Hunting? Learn the four steps to conduct a successful threat hunt in Splunk
9 MIN

Explore the top 10 take-aways from the Colonial Pipeline ransomware attack that we must all take to heart
9 MIN

We break down the anatomy of a ransomware attack including the stages of an attack and how to better detect and mitigate ransomware
6 MIN

Interested in learning the roles and responsibilities of a CISO? Discover more details behind the everyday tasks of a CISO
3 MIN

Discover what SecOps is and how your business can maximize its effectiveness. Learn more and get started protecting your business with Deepwatch
5 MIN

Learn more about top network security issues facing the cybersecurity industry today and how you can prevent them
7 MIN

Find network security best practices to implement now in order to start protecting your business information
4 MIN

Learn how to defend against and identify phishing emails to protect your device, your network and your company
6 MIN

Interested in implementing a stronger cybersecurity foundation in your business? Get started with these basic tips for cybersecurity today
6 MIN

Learn more about the Splunk Cloud and deepwatch partnership and the industry-leading MDR capabilities it brings for customers
5 MIN

Do you know what the difference between MDR and MSSP services are? Read more as Deepwatch uncovers the specifics behind MDRs vs. MSSPs
6 MIN

Wow, is it over yet? Did we make it? Let's talk about what 2020 meant from an information security perspective
5 MIN

What is MDR? Learn about the basics of MDR, how its different from MSSP, and how to get started with the cyber experts at Deepwatch
4 MIN

Read more about cyber threat intelligence and how it can help benefit your business. Discover more with the cybersecurity experts at Deepwatch today
6 MIN

What is CIA in cybersecurity? Learn more about CIA in cybersecurity, and how you can use CIA to benefit your business
6 MIN

Interested in learning cybersecurity terms? Read more about cybersecurity terminology and keep yourself up-to-date on the latest in cybersecurity
6 MIN

What is patch management? Learn about it, why it's important and how often it should be performed on your business
7 MIN

Why aren't you outsourcing your cybersecurity operations? Discover the benefits and misconceptions about outsourcing your cybersecurity team
7 MIN

Discover work from home best practices for security practitioners with Bill Bernard from Deepwatch. Learn how to find success while working from home today
5 MIN
Ready for Guardians You Can Trust?
Meet with us to discuss your threats, vulnerabilities, and challenges and discover how Deepwatch can stand watch over what matters most.