<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

What is Penetration Testing?

A penetration test or pen test is a simulated cyber-attack against computer systems, application systems, and IT infrastructure to discover loopholes. These simulated cyber-attacks come in diverse forms with the intent of breaching a system through its servers, web or mobile applications, and other endpoints. The purpose of pen testing is to discover exploitable vulnerabilities in a controlled setting before cybercriminals take advantage of them.

What is the MITRE ATT&CK Framework?

Datashield Becomes Financial Services Information Sharing and Analysis Center (FS-ISAC) Member

Scottsdale, Ariz. -- Datashield is proud to announce its membership with the Financial Services Information Sharing and Analysis Center (FS-ISAC). This partnership further emphasizes Datashield’s commitment to our clients in the financial sector.

Chronicle vs. LogRhythm

SolarWinds vs. Splunk: Comparing Two Leading SIEM Solutions

SolarWinds Log Event Manager and Splunk Enterprise Security are two of the top security information and event management tools. Both SIEM solutions differ but offer high-performing features that simplify threat detection and response within expansive networks.

What is SOAR?

SOAR is an acronym thrown around a lot within the cybersecurity industry, but what does it really mean? SOAR stands for Security Orchestration, Automation and Response.

5 Questions to Ask an MSSP

An organization’s choice to seek a managed security services provider (MSSP) to guard over its IT infrastructure is usually based on three major reasons.

Mimecast Breach Bulletin: Vulnerability 01-26-21

On January 26th, 2020, Mimecast released an updated statement about the compromise first published on January 12th 2020.

MDR Service Delivery Options

Organizations of all sizes rely on managed security service providers (MSSPs) to deliver managed detection and response (MDR) and additional cybersecurity services at scale. Understanding the various service options can save your organization money and resources.

    Related Posts