Skip to content
dotted-bg-white

Megan SHAW

avatar
Product advocate to current customers, I am old school with a varied set of experiences.

Blog Post by Megan SHAW

Megan SHAW 8 min read

Threat Hunting: Methodologies, Tools, and Tips

Threat hunting is the practice of proactively and continuously searching for cyber ...
Start Reading
Megan SHAW 5 min read

Cloud Security Monitoring - A Complete Guide

Cloud security monitoring consists of various processes that aid organisations in ...
Start Reading
Megan SHAW 4 min read

An Introduction to Security Analytics

Enterprises cannot predict the future, particularly when security threats are involved. ...
Start Reading
Megan SHAW 3 min read

Building a Security Operations Centre? Read this!

A company falls victim to a cyberattack every 39 seconds! 
Start Reading
Megan SHAW 4 min read

Demystifying The CERT-IN Direction

CERT-In is a nodal agency within the Ministry of Electronics and Information Technology ...
Start Reading
Megan SHAW 1 min read

Case Study: Akati Sekurity

Presenting a highly scalable solution Partnering with DNIF HyperScale SIEM provided Akati ...
Start Reading
Megan SHAW 6 min read

Your SOC Quick Start Guide

Cybersecurity threats are now more common, dangerous, and difficult to detect and defend. ...
Start Reading
Megan SHAW 5 min read

Top Threat Detection Strategies for Fintech Companies

A recent trend has seen organisations leveraging cloud for their critical workloads. ...
Start Reading
Megan SHAW 5 min read

Four Lessons Learned From the Log4j Vulnerability

Log4j is a Java-based software library used for login purposes. It is widely used by ...
Start Reading
Megan SHAW 3 min read

Ransomware attacks and how to avoid them

The year 2021 has brought a new wave of cyberattacks that seem to be hurting the digital ...
Start Reading