
How to Go from Patient Zero to Total Protection with a Strong Cybersecurity Strategy Using Snare Desktop Agents
August 14, 2024/by Gino Cobarrubias
How to Safeguard Your Cybersecurity Supply Chain
August 6, 2024/by Gino Cobarrubias
Key lessons from the 2024 Verizon Data Investigations Report
July 26, 2024/by Gino Cobarrubias
Veracode Case Study: Prophecy International
December 13, 2021/by Paige Montgomery
Post Breach (Conti) Remediation Assessment & Monitoring with Snare and Sysmon
Author: Rhys Thornton, Solutions Consultant (EMEA), Snare
Post-Breach…
September 30, 2021/by rhysthorntonPost-Breach…

Log Collection is Critical for Real-Time Threat Detection & Compliance
Log collection and storage integrity is critical for both accurate…
August 23, 2021/by Brad ThomasProducts
Recent Posts
- The 5 Logs Most Often Missing During Breach Investigations
- The Cyber Volume Crisis: Why Modern Security Teams Are Drowning in Data — and What to Do About It
- Snare’s ISO 27001 Certification & Commitment to Cyber Security Continues in 2025
- Visibility Starts at the Source: How Snare Agent v5.10 Standardises Global Security Operations
- Cyber Resilience: When “Detect & Recover” Beats “Prevent & Protect”
- How the Cyber 4Cs Help Security Leaders Build a Resilient Logging Strategy


