An Inside View into a Supply Chain Attack
In early 2019, it was reported that one of the largest information technology outsourcing and consulting firms had suffered a major data breach.
CrowdStrike Falcon Complete
Guidance for taking any organization to the highest level of endpoint protection regardless of internal resources.
Security Orchestration and Automation Playbook
This playbook highlights some of the most common use cases for security orchestration and automation, as well as useful tips on how to get started.
The Data-Driven Case for CI
What does a high performing technology delivery team look like? How do you know if your team is doing well?