Request a demo
Request a demo
Centralized vs Decentralized Security Operations: Know the Difference and Which to Adopt
7 minute read
| February 16, 2022

Centralized vs Decentralized Security Operations: Know the Difference and Which to Adopt

To centralize or decentralize? That’s the Shakespearean question many security leaders are asking themselves as they look to implement the best security operations model for... Read More
Why Businesses Need Converged Security Now More Than Ever
6 minute read
| November 15, 2021

Why Businesses Need Converged Security Now More Than Ever

The spotlight placed on cybersecurity is growing wider, shining brighter and continuing to permeate global conversations. Most recently it earned a top spot on the agenda of... Read More
5 Extreme Weather Risks With Major Impacts on Global Enterprises
11 minute read
| October 27, 2021

5 Extreme Weather Risks With Major Impacts on Global Enterprises

Since 1980, the U.S. has had about 300 weather and climate disasters each with damages reaching or exceeding $1 billion—totaling almost $2 trillion in overall costs,... Read More
A Checklist for Using Real-time Information to Manage Emerging Risks
5 minute read
| September 29, 2021

A Checklist for Using Real-time Information to Manage Emerging Risks

Security operations vary from company to company. How they and the supporting architecture are configured and resourced depends on their organization’s culture, industry,... Read More
Why and How Healthcare Cyber Attacks Are Steadily and Quickly Climbing
6 minute read
| August 4, 2021

Why and How Healthcare Cyber Attacks Are Steadily and Quickly Climbing

On September 28, 2020, Dataminr alerted customers to a ransomware attack targeting United Health Services hospitals just as those hospitals began losing access to phones,... Read More
Adopting a Holistic Approach to Security Operations in a Post-COVID World
4 minute read
| June 28, 2021

Adopting a Holistic Approach to Security Operations in a Post-COVID World

COVID-19 was this century’s largest global risk event to date, with far-reaching, long-lasting effects on society and the way we do business. Before COVID-19,... Read More
4 Crisis Leadership Behaviors for Security  Leaders to Adopt Now
4 minute read
| June 18, 2021

4 Crisis Leadership Behaviors for Security  Leaders to Adopt Now

2020 was a year punctuated by risk, and security leaders at many companies found themselves suddenly thrust into the spotlight, taking action to maintain business continuity.... Read More
Safeguarding Physical Assets in the New Normal
4 minute read
| June 15, 2021

Safeguarding Physical Assets in the New Normal

Over the last decade, it’s become increasingly clear just how interconnected our world is, and with it comes a pervasive, ever-expanding surface area of risk. The COVID-19... Read More
The SOC of the Future Is Converged
5 minute read
| April 19, 2021

The SOC of the Future Is Converged

When speaking to clients about their security operations centers (SOCs), one word inevitably makes its way into the conversation: convergence. They want to know if they... Read More
3 Ways Effective SOCs Use Real-time Information
4 minute read
| April 16, 2021

3 Ways Effective SOCs Use Real-time Information

In a recent survey conducted by Forrester Consulting, several hundred security, risk and compliance decision-makers were asked to define their concept of “real-time... Read More
6 Tips for Building a Physical Security Operations Center
7 minute read
| April 15, 2021

6 Tips for Building a Physical Security Operations Center

Since leaving the British Army five years ago to work in corporate security and risk management, I’ve heard numerous security leaders make a strong case for why they should... Read More
Defining Real-time Information in Your Organization
4 minute read
| February 22, 2021

Defining Real-time Information in Your Organization

What is real-time information? It’s a phrase that sits at the heart of our business: We exist to deliver relevant, real-time information to the world’s largest companies,... Read More