Deepwatch
Insights Blog
Read original blogs from Deepwatch thought leaders and guests on topics including threat intelligence, SOC efficiency, and industry news.
Need Help? 855.303.3033 | Contact Us
Deepwatch Enhances Capabilities with Open Security Data Architecture
Deepwatch
Read original blogs from Deepwatch thought leaders and guests on topics including threat intelligence, SOC efficiency, and industry news.
Filter Blog by:
3 MIN
Dive in with Deepwatch's Sr. Manager of Platform Operations and Engineering as he breaks down the engineering teams role in Splunk utilization.
3 MIN
Dive into the world of detection engineering and the use of the MITRE ATT&CK framework within the SOC with Deepwatch's Director of Threat Operations.
Deepwatch dives into the revolution in SOC data through the introduction of an Open Security Data Architecture to address key industry problems.
6 MIN
A TLDR on what security leaders need to know about the ConnectWise and ScreenConnect vulnerabilities, including recommendations beyond patching
5 MIN
Get insights on all things AWS detection engineering, including CloudTrail logs & alerting, best use of tools, detection use cases, & configurations
6 MIN
Get guidance from one of the largest SOCs in the business on key components to building a resilient security operations program
11 MIN
Adversaries are using popular domains to bypass Secure Email Gateway (SEG) protections. Learn how to leverage mature SIEM detections for solid defense
4 MIN
Zloader is back again. Get details of their latest variant (version 2.0.0.0), with insight on the inner workings of the threat, indicators, and tooling
14 MIN
Get the pertinent facts on Ivanti's two recent zero-day CVEs and know what actions you can take while patches are still being rolled out
3 MIN
Data leak sites listed over 2,400 victims in 2023. Read for a full analysis on groups, impact to industries and geography, and how to avoid falling victim
10 MIN
Get insights on the state of ransomware in 2023, its evolution and new threats, along with predictions for the landscape in 2024
9 MIN
The FBI has halted BlackCat/ALPHV on the dark web and provided a free, effective ransomware decryptor. Read for key lessons from this takedown
4 MIN
Deepwatch uncovers basics to being cyber threat ready in 2024 as attacks grow in complexity, volume, and inevitability. Learn how you can prepare
6 MIN
Deepwatch breaks down hyperautomation in cybersecurity - what it is, examples, and benefits. Learn how it's bringing harmony to dissonance
4 MIN
Understand the crucial elements of vulnerability management maturity and how they play into building cyber resilience
3 MIN
Microsoft Defender logs can be perplexing and convoluted. Hear from Deepwatch engineers as they break down this logging mechanism
4 MIN
Deepwatch's VP, Security & Content Strategy reveals key lessons from the recent MGM & Caesars cyber attacks that you can apply on your journey to cyber resilience
7 MIN
Uncover insights from recent security breaches, the business impact, and how a focus on cyber resilience could help your organization avoid the same
5 MIN
Get clear insights on what plus addressing is, how it enhances cyber awareness and resiliency, and how it can help reduce phishing attacks
3 MIN
As the attack landscape expands & grows in complexity, proactive defense is not enough. Learn why cyber resilience is imperative to organizations today
6 MIN
Get insights on Cisco's acquisition of Splunk, its impact on customers & the cybersecurity industry as a whole from CEO of Deepwatch, a key Splunk partner
5 MIN
The role of a security leader is not to prevent every attack. Discover how cyber resilience enables teams to respond competently when incidents occur
6 MIN
How to think, measure, & manage the evasive nature of cybersecurity risk in more modern & realistic ways. Read the full blog by Deepwatch CTO, Wes Mullins
4 MIN
Deepwatch CEO, Charlie Thomas, shares difficult news regarding reductions to the team given macroeconomic conditions and economic headwinds
3 MIN
As generative AI tools emerge, Deepwatch's Michael Mayes breaks down moral and ethical considerations, taking lessons from other emerging tech
8 MIN
SecOps outsourcing is more than just a reaction to a skills shortage. Unlock the key benefits it can have on your organizations long-term success and security
4 MIN
Explore the observations, metrics, trends and forecast the Deepwatch ATI team has uncovered in their 2023 Threat Report.
4 MIN
Understand the key challenges facing financial services SecOps teams in 2023 and what can be done to address them
6 MIN
Financial services organizations are faced with continuous cyber attacks and increased challenges. Discover the top 8 threats today
2 MIN
Understand the best path to achieving 24/7/365 security coverage for your organization
6 MIN
Understand the most damaging cyber attacks security teams should look for to reduce risk this holiday shopping season
8 MIN
Take and apply these vulnerability management best practices and future proof your organization from threats
5 MIN
Stay prepared & continue advancing your cybersecurity efforts with insight on the issues predicted to arise in 2023
7 MIN
Discover how healthcare organizations can bridge the cybersecurity skills gap amongst an ever changing landscape
4 MIN
New vulnerabilities are discovered every day. Know when it's time to improve your tech stack, hire, or leverage managed services
6 MIN
Stop living with extortion. Understand how to better protect your organization from ransomware with managed detection and response
4 MIN
Dive in as we breakdown Uber CISO, Joe Sullivan’s conviction, the pressures CISOs are under today and the mindset shift that needs to happen
6 MIN
In honor of Cybersecurity Awareness Month's theme of “See Yourself in Cyber”, CISO David Stoicescu shares tips and insights in this Q&A
8 MIN
Any company can be breached by an employee making a poor security choice. Get the background on Uber's security breach and lessons learned
7 MIN
Privacy and security extend beyond HIPAA. Understand how to effectively mature SecOps in healthcare to protect patient care
2 MIN
Building and maintaining a modern security operations center (SOC) is a dynamic and expensive endeavor. Know the hidden costs to take into account
4 MIN
Governments are updating their rules around cybersecurity incident reporting and industry leaders are crying foul. Read as we break this debate down
5 MIN
As economic concerns grow, security teams with limited resources look to Deepwatch Managed Security Solutions to optimize budgets, extend coverage, and reduce risk
4 MIN
Security Operations is no island and your team can’t secure everything by themselves. Cybersecurity is a team sport, and everyone needs to be involved. Your security operations team needs to collaborate with other groups and departments to understand priorities, goals, and objectives
4 MIN
Maturing security operations can be difficult, particularly if resources are limited, staff are hard-to-hire, and critical technology may not be properly deployed or may be lacking. These issues affect all companies, but they especially affect mid-sized businesses with small security teams. Introducing a SIEM solution, implementing remote workforce controls and employee training, and outsourcing to an external MDR provider are three strategies for maturing SecOps
5 MIN
Read about healthcare cybersecurity risks: budget constraints, targeted healthcare ransomware, staffing and skills gaps, and more
6 MIN
Learn about how companies are addressing top security challenges in 2022. Find out how Deepwatch can fortify your security posture
2 MIN
Deepwatch is a company that recognizes the value women bring to cyber security, and provides resources to elevate women within the workplace. As a young woman new to a role in cybersecurity, I am excited to see the steps Deepwatch continues to take to provide for its female employees
4 MIN
Ransomware attacks are now a top concern for CISOs and board rooms alike. Understand how to reduce risks with managed MDR
5 MIN
Vulnerability Management is a core domain within the Security program. Read why a strong vulnerability management program is required to help you advance your defense-in-depth strategy to ensure threat actors are detected and removed fast
7 MIN
A right-sized solution, particularly to cover the functions of managed detection and response (MDR), can help address the needs of mid-sized businesses with a solution that fits the budget and time constraints of these companies
5 MIN
Managing security risk today requires a proactive, defense-in-depth approach; threat hunting by expert threat hunters gives organizations 3 distinct advantages to better detect and respond to threats
4 MIN
Bridging the Cybersecurity Skills Gap: See how managed detection and response (MDR offers a fast and reliable solution to overcome risk
4 MIN
Organizations need managed detection and response (MDR) as a fast and reliable solution to overcome business risk associated with the cybersecurity skills gap
3 MIN
Cybercriminals and threats are constantly evolving. These are the 4 ways businesses can manage increasing risks with defense-in-depth strategies to measurably improve security operations outcomes
5 MIN
Deepwatch is actively working on risk mitigation for CVE-2021-44228, the actively exploited vulnerability in Apache Log4j, dubbed “Log4Shell.” Read the latest on what’s happening and what you can do to patch, protect, and defend your security environment from Log4j exploits
12 MIN
Cybersecurity reporting can be challenging when reporting to Executive Leadership and the Board. Learn how to use these Security Operation detection and response metrics and the language of risk management to convey results and explain budget requests
6 MIN
Deepwatch has released Forrester conducted analysis on the Total Economic Impact of their Managed Detection and Response services, including financial analysis on Return on Investment and the positive impact of Deepwatch MDR on cybersecurity investments. Read the three highlights and download the report today
2 MIN
Several reasons are driving the demand for MDR services into the future, and adding momentum to the market forces behind the MDR movement
2 MIN
Watch deepwatch experts 'walk the talk' and see how our security-first culture fuels improvements as innovation and cybersecurity connect
5 MIN
Learn how to defend against the risk of Sensitive Data Exposure, which is #3 on the OWASP List of Top 10 Risks to Web Applications
6 MIN
Read more about how to defend against the risk of broken authentication, which is #2 on the OWASP List of Top 10 Risks to Web Applications
9 MIN
Explore four ways to faster results when you launch or upgrade your SIEM (Security Information and Event Management) system
2 MIN
A logging strategy can help you identify the right data sources you need to best monitor your environment and see threats faster. Learn how to create a logging strategy to advance your threat detection and incident response in security operations
10 MIN
The term “kill chain” comes from a military concept that uses stages to outline the structure of an attack. “Breaking” the opponent's kill chain refers to the ability to block an attack at any stage
5 MIN
In light of the Kaseya VSA ransomware attack, a secure supply chain is more important than ever. Find out how to gauge levels of trust in your supply chain with these six security questions
6 MIN
What is Threat Hunting? Learn the four steps to conduct a successful threat hunt in Splunk
9 MIN
Explore the top 10 take-aways from the Colonial Pipeline ransomware attack that we must all take to heart
9 MIN
Evaluate your SIEM’s performance and your Managed Security Services’ capabilities to manage your SIEM with these 6 questions
5 MIN
Continuing to learn and grow in one’s career - especially in cybersecurity - is more than just a professional advantage
4 MIN
Understand details of the May 7, 2021 Colonial Pipeline darkside ransomware attack, potential mitigations, and how you can prepare for future events
6 MIN
Read about three common cybersecurity threats (phishing, endpoints, and ransomware) and how companies can best defend against them
7 MIN
Learn more about the current landscape of healthcare cybersecurity and the impact of recent ransomware attacks
9 MIN
In this first post covering the Top 10 Risks for Web Application Security, we will dig into the top culprit in the list -- Injection
4 MIN
Splunk certificate management tips to update Splunk's out-of-the-box, root Certificate Authority (CA) for a more secure Splunk environment
7 MIN
Explore SOAR cybersecurity best practices. Get to know the significance and impact behind Security Orchestration Automation and Response
4 MIN
We break down the anatomy of a ransomware attack including the stages of an attack and how to better detect and mitigate ransomware
6 MIN
Interested in learning the roles and responsibilities of a CISO? Discover more details behind the everyday tasks of a CISO
3 MIN
Discover what SecOps is and how your business can maximize its effectiveness. Learn more and get started protecting your business with Deepwatch
5 MIN
Learn more about top network security issues facing the cybersecurity industry today and how you can prevent them
7 MIN
The Big Red Pill: Let the Deepwatch team show you how to use the Palo Alto Networks Best Practices Tool to optimize your firewall security
11 MIN
Learn more about how Deepwatch helps migrate customers from on-prem to Splunk Cloud in a painless and efficient way
4 MIN
Find network security best practices to implement now in order to start protecting your business information
4 MIN
Understanding your cybersecurity maturity. Learn more about maturity assessment by reading this interview today
6 MIN
Learn how to defend against and identify phishing emails to protect your device, your network and your company
6 MIN
Interested in implementing a stronger cybersecurity foundation in your business? Get started with these basic tips for cybersecurity today
6 MIN
Learn how to connect the language of business and how to talk about cybersecurity risk management from the experts at Deepwatch
6 MIN
Learn more about the Splunk Cloud and deepwatch partnership and the industry-leading MDR capabilities it brings for customers
5 MIN
Do you know what the difference between MDR and MSSP services are? Read more as Deepwatch uncovers the specifics behind MDRs vs. MSSPs
6 MIN
Wow, is it over yet? Did we make it? Let's talk about what 2020 meant from an information security perspective
5 MIN
What is MDR? Learn about the basics of MDR, how its different from MSSP, and how to get started with the cyber experts at Deepwatch
4 MIN
Discover how to protect your phone from hackers. From what signs to look out for to what to do if your phone gets hacked
7 MIN
Read more about cyber threat intelligence and how it can help benefit your business. Discover more with the cybersecurity experts at Deepwatch today
6 MIN
What is CIA in cybersecurity? Learn more about CIA in cybersecurity, and how you can use CIA to benefit your business
6 MIN
Interested in learning cybersecurity terms? Read more about cybersecurity terminology and keep yourself up-to-date on the latest in cybersecurity
6 MIN
What is patch management? Learn about it, why it's important and how often it should be performed on your business
7 MIN
Learn Why to Choose Veterans to Continue Their Service On Your Cyber Front Lines! Read to Collect Veteran Resources
5 MIN
There is a strong connection between Deepwatch and The Undercroft. Many wonder “What can I do?" to fill the cybersecurity skills gap
3 MIN
Curious how Deepwatch's Squad service model was born? Explore the benefits of partnering with a dedicated team of seasoned security experts
5 MIN
The Twitter hack shakes trust in the platform. Read about the InfoSec impact and critical steps businesses can take to prepare for similar issues
5 MIN
Deepwatch gives back! Deepwatch donates to Feed the Frontlines Denver to provide support to the hard working frontline workers in the Denver community
3 MIN
Listen to the deepwatch Dive Podcast - Episode 1. Learn how Security Analyst Matt Fay got his start in cybersecurity and how he secures customer networks
2 MIN
Why aren't you outsourcing your cybersecurity operations? Discover the benefits and misconceptions about outsourcing your cybersecurity team
7 MIN
Deepwatch serves customers from a nationwide home office-based team. We support our employees and the local communities wherever they reside
3 MIN
Learn the basics of setting up a secure and successful remote workforce with this Remote Working Technology Checklist
4 MIN
Are you having trouble figuring out how to set up and manage your remote workforce? Learn from Deepwatch's experience as a 100% remote organization
5 MIN
Working from home? Discover how to choose the best WiFi router and how to properly secure it so you can work effectively and securely
7 MIN
Discover work from home best practices for security practitioners with Bill Bernard from Deepwatch. Learn how to find success while working from home today
5 MIN
Looking for the advantages of working remotely? Learn more about the Deepwatch operating model and how it benefits security operations, talent acquisition and more.
4 MIN
Let's Talk
Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.