Kevin Gee
Recent Posts
Bring Every Signal Into Focus With GravityZone Security Data Lake
Security teams aren’t short on tools—they’re short on clarity. Logs live in silos where ...
How to Use NIST CSF 2.0 to Identify Security Gaps (Part 5)
This is the fifth blog in a five-part series on utilizing a cybersecurity framework (NIST ...
How to Use NIST CSF 2.0 to Identify Security Gaps: Part 4
Welcome back to this five-part series on using a cybersecurity framework (NIST CSF 2.0) to ...
Should You Build an Elite SOC Team or Hire One?
Let’s say your business is booming. A new product launch is going well, the company is ...
Introducing MDR Breach Warranty
With the increasing frequency of breaches and the growing complexity of cybersecurity ...
How to Use NIST CSF 2.0 to Identify Security Gaps: Part 3
For those just tuning in, this five-part series is all about how to use a cybersecurity ...
Identifying Security Gaps Using the NIST Cybersecurity Framework: Part 2
In our last post, we explored the vital role cybersecurity frameworks play in guiding ...
Identifying Security Gaps Using the NIST Cybersecurity Framework: Part 1
Welcome to the first part of a five-part series exploring how the NIST Cybersecurity ...
Why MDRs Expanding Into Other Services Will Help Keep Companies More Secure
It seems like just yesterday that most organizations had never heard of Managed Detection ...


