Let's talk Security
Industry news, blog, videos and more
The latest updates
BlogJanuary 14, 2020
The Four Pillars of Network Security
Every organization works hard to attain a healthy security posture. But what does that mean? It involves a properly resourced team of i...
BlogJanuary 9, 2020
The True Cost of Information Security
In-House vs. Outsourcing SIEM A security information event management platform, or SIEM, is one of the most critical components of a ...
BlogJune 17, 2019
The Castra ELK Logger for USM Appliance
A fast and scalable solution to pair with your existing USM instance Do you need to add long-term logging to your USM Appliance? Do...
BlogJune 13, 2019
Windows Audit Policy Basics
Windows Audit Policy This is a basic guide for configuring your Audit Policies in Windows, such that when we emit these logs to a SIEM,...
NewsJanuary 11, 2019
Top 5 Cybersecurity Steps to Take in 2019
Cross Posted from Net Friends Author(s): Net Friends
NewsNovember 15, 2018
Bandura Cyber Announces Strategic Partnership with Castra Consulting
Partnership Enables Automated Threat Intelligence Protection
BlogAugust 16, 2018
Beginners Guide to IDS, IPS and UTM - What's the difference?
There is often a lingering and general confusion over the acronyms IDS and IPS, and how they are like or unlike UTM software modules. E...
BlogMay 1, 2018
Set it and forget it fail
You’ve set up your SIEM, you have logs flowing and a report or three. You are done, right? You don’t need to look at it every day, righ...
BlogMarch 31, 2018
The use of default credentials by vendors is an outdated, dangerous throwback to 20th century practices that has no business being used...
BlogJanuary 8, 2018
Shadyware ... Malware or Legit Software
What's the difference between malware and legitimate software? Just as malware is often purported to be legitimate software, legitimate...