Product advocate to current customers, I am old school with a varied set of experiences.
Blog Post by Megan SHAW
Megan SHAWDec 20, 2024 12:30:00 AM5 min read
Threat Hunting: Methodologies, Tools, and Tips
Table of Content Prelude A Three-Step Guide to Building a Threat Hunting Framework Threat ...
Start Reading
Megan SHAWDec 10, 2024 12:15:00 AM2 min read
HOW TO USE SIEM TO IMPROVE YOUR ORGANIZATION'S DATA PROTECTION AND PRIVACY PRACTICES
Table of Content
Start Reading
Megan SHAWDec 3, 2024 12:30:00 AM2 min read
Best Practices for Configuring and Managing Your SIEM Product
Table of Content
Start Reading
Megan SHAWNov 29, 2024 12:30:00 AM2 min read
The Benefits of Using SIEM for Cloud Security and Monitoring
Table of Content
Start Reading
Megan SHAWNov 26, 2024 12:30:00 AM2 min read
THE BENEFITS OF USING SIEM FOR THREAT INTELLIGENCE AND HUNTING
Table of Content
Start Reading
Megan SHAWNov 22, 2024 12:45:00 AM1 min read
The Potential Cost Savings of Using Cloud SIEM
Table of Content
Start Reading
Megan SHAWNov 22, 2024 12:30:00 AM1 min read
The Benefits of Using SIEM for Incident Response and Forensics
Table of Content
Start Reading
Megan SHAWNov 19, 2024 12:15:00 AM3 min read
Importance of Considering the Support & Maintenance SIEM Vendor Offer
Table of Content
Start Reading
Megan SHAWOct 29, 2024 9:00:00 AM3 min read
Training and Educating SOC teams on SIEM Best Practices
Table of Content Introduction Training & Educating SOC team on SIEM Best Practices ...
Start Reading
Megan SHAWOct 28, 2024 9:00:00 AM5 min read
Protect your active directory from Admin SD Holder Attack
Table of Content Introduction What is a Security Operations Center? Role of SIEM in SOC ...
Start Reading
Megan SHAWOct 28, 2024 9:00:00 AM5 min read
The importance of considering the total cost of ownership
Table of Content Introduction Importance of Considering the Total Cost of Ownership ...
Start Reading
Megan SHAWOct 27, 2024 9:00:00 AM4 min read
Cyber Security Future in the wake of ChatGPT and AI
Table of Content Introduction Potential Cyber Threats of ChatGPT Key Takeaways ...
Start Reading