Sep 19, 2025 | Breach, Critical Infrastructure, Cybersecurity, SIEM, Technology News
Still using 20+ Yr old Splunk or another Log-Based SIEM? While obvious, it’s 2025, and there’s been new SIEM technology available for years! It’s Anamo, a log-less SIEM that’s eliminating traditional “Blind Spots” and various anomalies related to System-Based Indicators of Attack (IoA”s), Modifications of Users, Permissions, Ports and Transactions… and much more! Anamo is named after its ability to rapidly identify Host-Based attack vectors and other Indicators of Compromise (IoC’s) where all other Network-based SIEMs remain blind.
Jun 18, 2024 | Technology News
Big game cyber hunting is a type of cyberattack that usually leverages ransomware to target large, high-value organizations or high-profile entities. So the question is simple, how do they [the Hackers] determine high-value?
May 1, 2024 | SMB Technology, SMB Technology, SMB Technology, SMB Technology, Technology News
Cybersecurity, ever a topic for businesses of all sizes, poses special challenges for small to medium-size businesses. Not only can they be special targets for bad actors, but they also deal with tight budgets and at times a lack of understanding of what cybersecurity means. Read on to learn how a small business can meet cybersecurity challenges and build strong defenses.
Jan 6, 2024 | SMB Technology, SMB Technology, SMB Technology, SMB Technology, Technology News
Cybersecurity is an ever-present issue, especially in these times of rapid innovation. With this innovation, companies need to remember the importance of protecting systems, devices, networks and data from cyber attack. But what if we all went a few steps beyond,...
Nov 9, 2023 | SMB Technology, SMB Technology, SMB Technology, SMB Technology, Technology News
The old defenses against cyberattacks–firewalls, antivirus programs and operating system patches–worked well when the security perimeter was the office. Now that remote work is here to stay and more devices are connected to company networks, protecting networks is more complicated. Read on to learn how defense in depth, an integration of individual tools, can help you better protect your technological assets.