Our articles - DEEP
Our articles
Cybersecurity: how to reduce false positives
Increased scrutiny of network infrastructure has sent the number of security alerts skyrocketing. However, IT teams have a tendency to ignore these alerts amid so much crying wolf, and this poses a critical security risk to their business.
Read this articlePublished on
04 February 2021
A three-step approach to face up to the challenges of IoT security monitoring
As convenient as IoT solutions can be, they also present new security risks. Not only, the number of devices is increasing in magnitude, they may be exposed also to physical access.
Read this articlePublished on
14 January 2021
How do correlation strategies work within an SOC?
Phishing, ransomware… cyber-attacks against businesses have surged this year. To protect against them, more and more businesses are choosing to set up an SOC: Security Operations Centre.
Read this articlePublished on
20 October 2020
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expertOur experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?