Product advocate to current customers, I am old school with a varied set of experiences.
Blog Post by Megan SHAW
Megan SHAWMay 25, 2022 11:27:00 PM2 min read
How to use SIEM to monitor and protect critical infrastructure
Security information and event management (SIEM) systems are essential tools for ...
Start Reading
Megan SHAWMay 23, 2022 7:30:00 PM3 min read
Cloud Security Monitoring - A Complete Guide
Cloud security monitoring consists of various processes that aid organisations in ...
Start Reading
Megan SHAWMay 18, 2022 9:30:00 PM2 min read
An Introduction to Security Analytics
Enterprises cannot predict the future, particularly when security threats are involved. ...
Start Reading
Megan SHAWMay 18, 2022 4:15:38 AM2 min read
Building a Security Operations Centre? Read this!
A company falls victim to a cyberattack every 39 seconds!
Start Reading
Megan SHAWMay 13, 2022 3:46:00 AM2 min read
Demystifying The CERT-IN Direction
CERT-In is a nodal agency within the Ministry of Electronics and Information Technology ...
Start Reading
Megan SHAWMay 8, 2022 8:15:00 PM4 min read
How to Build a SOC : Your SOC Quick Start Guide
Cybersecurity threats are now more common, dangerous, and difficult to detect and defend. ...
Start Reading
Megan SHAWApr 19, 2022 3:40:00 AM2 min read
SIEM for Manufacturing Industry: Enhancing Supply Chain Security
As a manufacturer, protecting your supply chain is crucial to the success of your ...
Start Reading
Megan SHAWMar 21, 2022 12:10:17 PM3 min read
Top Threat Detection Strategies for Fintech Companies
A recent trend has seen organisations leveraging cloud for their critical workloads. ...
Start Reading
Megan SHAWMar 13, 2022 6:12:14 AM3 min read
Four Lessons Learned From the Log4j Vulnerability
Log4j is a Java-based software library used for login purposes. It is widely used by ...
Start Reading
Megan SHAWMar 13, 2022 3:58:30 AM2 min read
Ransomware attacks and how to avoid them
The year 2021 has brought a new wave of cyberattacks that seem to be hurting the digital ...
Start Reading
Megan SHAWMar 5, 2022 1:12:00 AM1 min read
The benefits of using SIEM for threat intelligence and hunting
Threat intelligence and hunting are essential components of an effective cybersecurity ...
Start Reading
Megan SHAWFeb 22, 2022 1:30:00 AM2 min read
Role of SIEM in Supporting Cyber Insurance & Risk Management
As the prevalence of cyber threats continues to grow, organizations are increasingly ...
Start Reading