
Product advocate to current customers, I am old school with a varied set of experiences.
Blog Post by Megan SHAW
Megan SHAW
8
min read
Threat Hunting: Methodologies, Tools, and Tips
Threat hunting is the practice of proactively and continuously searching for cyber ...
Start Reading
Megan SHAW
5
min read
Cloud Security Monitoring - A Complete Guide
Cloud security monitoring consists of various processes that aid organisations in ...
Start Reading
Megan SHAW
4
min read
An Introduction to Security Analytics
Enterprises cannot predict the future, particularly when security threats are involved. ...
Start Reading
Megan SHAW
3
min read
Building a Security Operations Centre? Read this!
A company falls victim to a cyberattack every 39 seconds!
Start Reading
Megan SHAW
4
min read
Demystifying The CERT-IN Direction
CERT-In is a nodal agency within the Ministry of Electronics and Information Technology ...
Start Reading
Megan SHAW
1
min read
Case Study: Akati Sekurity
Presenting a highly scalable solution Partnering with DNIF HyperScale SIEM provided Akati ...
Start Reading
Megan SHAW
6
min read
Your SOC Quick Start Guide
Cybersecurity threats are now more common, dangerous, and difficult to detect and defend. ...
Start Reading
Megan SHAW
5
min read
Top Threat Detection Strategies for Fintech Companies
A recent trend has seen organisations leveraging cloud for their critical workloads. ...
Start Reading
Megan SHAW
5
min read
Four Lessons Learned From the Log4j Vulnerability
Log4j is a Java-based software library used for login purposes. It is widely used by ...
Start Reading
Megan SHAW
3
min read
Ransomware attacks and how to avoid them
The year 2021 has brought a new wave of cyberattacks that seem to be hurting the digital ...
Start Reading