Co-Managed SOC

Co-Managed SOC

The topic of the day in security as of late has been Endpoint Detection and Response (EDR).  The buzz has created a lot of conversations with our clients about Threat Hunting, Threat Remediation and Indicators of Compromise.  The challenge for many of our clients is...
Security at the Edge

Security at the Edge

Rather than relying on the cloud or data centers, computing is now done at or near the source of the data, otherwise known as the edge. While the cloud is being leveraged for storage and computing power, things have become centralized. But distance can mean latency....