Skip to content
dotted-bg-white

Megan SHAW

avatar
Product advocate to current customers, I am old school with a varied set of experiences.

Blog Post by Megan SHAW

Megan SHAWMay 25, 2022 11:27:00 PM2 min read

How to use SIEM to monitor and protect critical infrastructure

Security information and event management (SIEM) systems are essential tools for ...
Start Reading
Megan SHAWMay 23, 2022 7:30:00 PM3 min read

Cloud Security Monitoring - A Complete Guide

Cloud security monitoring consists of various processes that aid organisations in ...
Start Reading
Megan SHAWMay 18, 2022 9:30:00 PM2 min read

An Introduction to Security Analytics

Enterprises cannot predict the future, particularly when security threats are involved. ...
Start Reading
Megan SHAWMay 18, 2022 4:15:38 AM2 min read

Building a Security Operations Centre? Read this!

A company falls victim to a cyberattack every 39 seconds!
Start Reading
Megan SHAWMay 13, 2022 3:46:00 AM2 min read

Demystifying The CERT-IN Direction

CERT-In is a nodal agency within the Ministry of Electronics and Information Technology ...
Start Reading
Megan SHAWMay 8, 2022 8:15:00 PM4 min read

How to Build a SOC : Your SOC Quick Start Guide

Cybersecurity threats are now more common, dangerous, and difficult to detect and defend. ...
Start Reading
Megan SHAWApr 19, 2022 3:40:00 AM2 min read

SIEM for Manufacturing Industry: Enhancing Supply Chain Security

As a manufacturer, protecting your supply chain is crucial to the success of your ...
Start Reading
Megan SHAWMar 21, 2022 12:10:17 PM3 min read

Top Threat Detection Strategies for Fintech Companies

A recent trend has seen organisations leveraging cloud for their critical workloads. ...
Start Reading
Megan SHAWMar 13, 2022 6:12:14 AM3 min read

Four Lessons Learned From the Log4j Vulnerability

Log4j is a Java-based software library used for login purposes. It is widely used by ...
Start Reading
Megan SHAWMar 13, 2022 3:58:30 AM2 min read

Ransomware attacks and how to avoid them

The year 2021 has brought a new wave of cyberattacks that seem to be hurting the digital ...
Start Reading
Megan SHAWMar 5, 2022 1:12:00 AM1 min read

The benefits of using SIEM for threat intelligence and hunting

Threat intelligence and hunting are essential components of an effective cybersecurity ...
Start Reading
Megan SHAWFeb 22, 2022 1:30:00 AM2 min read

Role of SIEM in Supporting Cyber Insurance & Risk Management

As the prevalence of cyber threats continues to grow, organizations are increasingly ...
Start Reading