By security practitioners, for security practitioners novacoast federal | Apex Program | novacoast | about innovate
By security practitioners, for security practitioners

Security Knowledge Guides

In an effort to bring some insight to the myriad concepts of cybersecurity, we’ve prepared some Knowledge Guides for specific topics across several categories.

Tooling and Technology

Guide To Better Security Logging

Novacoast senior engineer Dan Elder makes a case for better, more thorough log management practices for effective and efficient security data handling.

MITRE ATT&CK 101

Basic primer of what MITRE ATT&CK is, what it can do, and why it's a popular resource for security professionals.

Cybersecurity Strategy

Assessments and Evaluation

How To Get the Most Out of Your Pen Test

Most organizations are wisely running pen tests on regular basis. Just like going to the doctor for a yearly physical, these engagements allow an organization to gauge their security posture…

Security Assessments 101

“An ounce of prevention is worth a pound of cure.” Benjamin Franklin Security assessments are an integral part of any security program. Some are required based on a given…

Data Security

A Data Security Primer

A high level guide to various methods for securing and protecting data in its many forms.

Managed Security Services

Phishing Monitoring

Phishing is the malicious tactic of sending fraudulent emails to trick recipients into revealing sensitive information, making payments, or downloading malware. It continues to be the most…

Co-Managed SIEM

The concept of SIEM has become a ubiquitous and mandatory element of any modern security program, collecting data and providing visibility of security events FAQ What does the acronym…

Vulnerability Management

Vulnerability Management is the practice of identifying and remediating known bugs in software that pose a security threat.

Managed EDR

Endpoint Detection and Response (EDR) and Managed EDR (MDR) are cornerstones of modern security posture, just as antivirus and firewalls were 15 years ago. With advanced threats and the…

Innovate uses cookies to give you the best online experience. If you continue to use this site, you agree to the use of cookies. Please see our privacy policy for details.