Blog
Insights for the modern SOC
Actionable thinking for teams that want more from their security stack.

All
AI
All Categories
Amazon S3
API Security
Business Apps
CDN & Edge
CISO
Cloud
Company News
CSPM
Database Security
Detection tools
DevSecOps
DLP & Data Security
EDR
EDR
Email & Training
Firewalls & Network
IAM
IDS/IPS
Logging & Data Pipeline
MDR
NAC
NDR
OT/ ICS
Phishing
SASE
Security Automation
Security Operations
SIEM
SOAR
SOC Operations
SWG & Proxy
Threat Intelligence
VPN & ZTNA
Vulnerability Management
WAF
When Your $2M Security Detection Fails: Can your SOC Save You?
When your $2M in detection tools inevitably fail, your SOC is the only thing standing between a missed alert and a catastrophic breach. Without a strong last line of defense, you're leaving the door wide open to threats that detection was never actually built to catch.
Phishing the C-suite: How quick-acting SOC teams caught what everyone else missed
Employees can be a vulnerable entry point and traditional security tools are not infallible. That's why SOC teams should be empowered to focus on what matters.
Investigating Microsoft 365 email threats with Radiant
What is Microsoft 365? Microsoft Office 365, often referred to as Office 365 or simply O365, is a comprehensive suite of cloud-based productivity and collaboration tools and services developed by Microsoft. Microsoft 365 includes Microsoft’s Outlook solution— the world’s most popular email-management tool, with a staggering 40.42% market share. What is Radiant Security? Radiant Security […]