Blog Cybersecurity
blue password image

Top 5 NIST Password Guidelines

                Authentication credentials are one of the most sought-after pieces of digital information that hackers wish to obtain. It takes a lot of time, dedication, and reconnaissance for most hackers to break into a system, network, or private application through means such as vulnerabilities and exploits. However, it […]

Blog Cybersecurity IT Observability

Here’s How to Get a Handle on Noise and Alert Fatigue

Editor’s Note: This article is co-authored by Barry Duncan, Team Lead, Professional Services Observability; and Chase Yates, Practice Manager, Security. A common problem technology teams face is the high volume of noise in their environments and the resulting alert fatigue.  Items clamoring for an analyst’s attention can include:  Threats  Anomalies  Incidents  Notable Events  According to […]