from the Gartner Blog Network
Become a Client
Call us now at:
Contact us online
by Augusto Barros | July 6, 2016
We often hear clients asking about threat intelligence related processes: how to collect, refine and utilize it (by the way, this document is being updated; let us know if you...
Read more »
by Augusto Barros | September 30, 2015
In a very distant past, security monitoring used to be a very simple activity. A single guy would grab logs from the firewall, the IDS and maybe an authentication system...