In an effort to bring some insight to the myriad concepts of cybersecurity, we’ve prepared some Knowledge Guides for specific topics across several categories.
Tooling and Technology
Top 5 Best Security Practices For Microsoft Azure
These five best practices for Microsoft Azure security will help your business build a more robust and resilient cloud infrastructure to withstand today's constantly evolving threat landscape.
Guide To Better Security Logging
Novacoast senior engineer Dan Elder makes a case for better, more thorough log management practices for effective and efficient security data handling.
MITRE ATT&CK 101
Basic primer of what MITRE ATT&CK is, what it can do, and why it's a popular resource for security professionals.
Cybersecurity Strategy
Verify Email Origin Authenticity By Implementing DMARC
Implement DMARC to add one more layer of email origin authentication and prevent spoofers from slipping fake emails into your inboxes.
Common Pitfalls in Continuous Monitoring
Optimize your organization's SIEM/continuous monitoring program by applying 3 simple steps to your cybersecurity strategy.
Assessments and Evaluation
How To Get the Most Out of Your Pen Test
Most organizations are wisely running pen tests on regular basis. Just like going to the doctor for a yearly physical, these engagements allow an organization to gauge their security posture…
Security Assessments 101
“An ounce of prevention is worth a pound of cure.” Benjamin Franklin Security assessments are an integral part of any security program. Some are required based on a given…
Data Security
Protecting Microsoft Teams From Data Exfiltration – A Tactical DLP Rule
The ubiquity of Microsoft Teams as a meeting tool makes it a ripe target for data breach.…
Building a Foundational Data Classification Strategy
Whether it's the most sensitive national security data or simple office printouts,…
A Data Security Primer
A high level guide to various methods for securing and protecting data in its many forms.
Managed Security Services
Phishing Monitoring
Phishing is the malicious tactic of sending fraudulent emails to trick recipients into revealing sensitive information, making payments, or downloading malware. It continues to be the most…
Co-Managed SIEM
The concept of SIEM has become a ubiquitous and mandatory element of any modern security program, collecting data and providing visibility of security events FAQ What does the acronym…
Vulnerability Management
Vulnerability Management is the practice of identifying and remediating known bugs in software that pose a security threat.
Co-Managed Privileged Access Management (PAM)
Cooperative administration and maintenance of PAM tasks can improve performance and reliability of your privileged access foundation.
Managed EDR
Endpoint Detection and Response (EDR) and Managed EDR (MDR) are cornerstones of modern security posture, just as antivirus and firewalls were 15 years ago. With advanced threats and the…