Skip to content
dotted-bg-white

Megan SHAW

avatar
Product advocate to current customers, I am old school with a varied set of experiences.

Blog Post by Megan SHAW

Megan SHAW 6 min read

What are the best measures to avoid APT attacks?

Advanced persistent threats (APTs) are cyber attacks that have the potential to cause the ...
Start Reading
Megan SHAW 5 min read

What is ransomware and how does it work?

Ransomware is a type of malicious software or malware that restricts access to computer ...
Start Reading
Megan SHAW 4 min read

It's time to modernize your SOC

Today’s Security Operations Centre (SOC) needs the right tools along with the right ...
Start Reading
Megan SHAW 5 min read

Protect Your Systems From Within - An Introduction To Insider Threats

Is your cybersecurity plan focused only on external threats? Do you not consider issues ...
Start Reading
Megan SHAW 8 min read

Threat Hunting: Methodologies, Tools, and Tips

Threat hunting is the practice of proactively and continuously searching for cyber ...
Start Reading
Megan SHAW 5 min read

Cloud Security Monitoring - A Complete Guide

Cloud security monitoring consists of various processes that aid organisations in ...
Start Reading
Megan SHAW 4 min read

An Introduction to Security Analytics

Enterprises cannot predict the future, particularly when security threats are involved. ...
Start Reading
Megan SHAW 3 min read

Building a Security Operations Centre? Read this!

A company falls victim to a cyberattack every 39 seconds! 
Start Reading
Megan SHAW 4 min read

Demystifying The CERT-IN Direction

CERT-In is a nodal agency within the Ministry of Electronics and Information Technology ...
Start Reading
Megan SHAW 1 min read

Case Study: Akati Sekurity

Presenting a highly scalable solution Partnering with DNIF HyperScale SIEM provided Akati ...
Start Reading