IT Tooling

Signal vs Noise: Turning your SIEM into an Active Defence

SIEMs are a great tool for investigation after an event occurred but what if we could use them to prevent the event in the first place?

SIEM Blind Spot: Why Logging isn’t Enough

SIEMs are a critical part of our security infrastructure but between false positives and response time, they're not nearly enough. How can we change that?

Every Protocol Has a Story. We Stop the Attack

The danger to your infrastructure isn't in your protocols. Every protocol - yes, even Telnet - has legitimate use cases but you need to consider how to protect them.

Deploy Keystrike in 20 Minutes

Try Keystrike in Your Environment for 30 Days