Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Cybersecurity

Latest blogs

Topic : Cybersecurity
  • --Any--
  • Managed attribution
  • OSINT
  • Intel and evidence
  • Cybersecurity
  • Dark web
  • Web isolation
generia blog

New Silo-Splunk integration for SOCs automates log correlation

New Silo for Safe Access feature provides Splunk integration for SOCs to monitor employee web and SaaS app access on any device, managed or…

generia blog

New Splunk integration for threat hunting, other online research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an…

generia blog

Incident response to APTs: stop data loss, maintain connectivity, find the adversary

When performing incident response to APTs, balance priorities of fully rooting out adversaries and limiting disruption to the business.

generia blog

Protecting against election interference in 2024

Despite near constant news around accusations of election interference, the 2020 general election has been called “the most secure in…

5 Steps for secure malware analysis

Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the…

generia blog

Practice safe SECs: Cyber intelligence experts on building safe operational security and information security practices

What is operational security? Why is it important for the CISO? What’s an intelligence cycle, and how do you successfully execute its data…

Gaining efficiency in the overloaded SOC

Email-based and web-based attacks have unnecessarily overloaded SOCs with incidents to investigate and taken attention away from truly…

generia blog

Election security: Defending our democracy against well-resourced adversaries

Election interference is about more than hacking voting machines. Hear from the experts on the role social media and other channels play…

generia blog

The best defense is a good OSINT

Malicious actors affiliated with China’s Ministry of State Security (MSS) are utilizing publicly available data to identify vulnerabilities…

Blog updates

Stay updated with the latest posts from the blog
Close
Close