Author name: Gio

Cyber Architecture

Setting The Architecture Scope

Adopting a Zero Trust Architecture (ZTA) is a shift in cybersecurity tactics for companies looking toenhance their security measures in today’s digital world. However, this shift demands planning,comprehension, and implementation.

System Hardening

Operating System Hardening

As the company’s Chief Information Security Officer (CISO), one of my tasks is to update the ITPolicy for Operating System (OS) hardening. This task is especially important considering theevolving and

System Hardening

NextGen SIEM Selection Approach

When selecting a Security Incident Event Manager (SIEM) tool, such as the LogRhythm NextGenSIEM Platform, it’s crucial to choose one that aligns with Singletree Engineering’s unique needsand goals. This alignment

Emerging Threats

ExtraHop Demo

This Demo, “Network Detection & Response,” provides a brief overview of the Reveal(x)network’s detection and response and enables security analysts to investigate and respond toattacker tactics, techniques, and procedures from

Scroll to Top