Skip to the main content.
Login SCHEDULE A DEMO
Login SCHEDULE A DEMO

Netenrich Insights and Research

SOC

data analytics

CISOs Must Make Data Analytics a Top Priority

This time of year, people often ask me about highlights from the past year and what to expect in the new year. As I reflect back on major threats and...

Keep reading

Want to Optimize Threat Detection & Response? 5 Patterns vs. 500 Rules

One vendor uses 5 patterns, the other uses 500 rules. What’s better?   

Anyone who has configured a SIEM or UEBA (e.g., QRadar, Splunk, ArcSight,...

Keep reading
SOC functionality

Amp up Security: MITRE’s SOC Strategies Go to 11. But Can We Go Higher?

MITRE strategy 10 says measure performance to improve performance. It’s important to set a baseline of where resources spend their time and energy —...

Keep reading

Subscribe To Our Blog!

The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.