Beth_Bischoff

Protecting Containers: A Primer for Moving from an EDR-based Threat Approach

Many security teams are familiar with an EDR-based approach to security. However, container protection within their cloud ecosystem can seem much more challenging and complex.    Protecting containers requires an understanding of the complete attack surface that containers expose–whether you are running them using an orchestrator like Kubernetes or locally using Docker.   In this […]

Protecting Containers: A Primer for Moving from an EDR-based Threat Approach Continue Reading

Future Proof your SOC with the Power of the Azure Ecosystem and Defender Threat Intelligence

In today’s world of ever-evolving sophisticated threats, time is of the essence when it comes to an efficient SOC’s continuous feedback loop for reducing attacker dwell time. The days of humans writing effective rules to detect malicious activity are gone. Reducing attacker dwell time requires a host of people, processes, and modern technologies including Artificial

Future Proof your SOC with the Power of the Azure Ecosystem and Defender Threat Intelligence Continue Reading

Your Ultimate Solution for Catching Container Image Exposure Before It Happens

  As the use of container technology continues to grow, it has become increasingly important to understand the risks and potential vulnerabilities that come along with it. One of the key components of any container ecosystem is the container registry, which is responsible for storing and distributing container images. One popular registry provider is Microsoft

Your Ultimate Solution for Catching Container Image Exposure Before It Happens Continue Reading