
Cutting the Noise
As businesses expand to all geographies and time zones, the task of defending an ever-enlarging and ever-changing perimeter becomes increasingly daunting. Infrastructure endpoints, workstations in particular, are critical points of attack – and defense.

How Agents Clean Up the Mess
Agentless SIEM deployments have a certain appeal, after all the fewer installs the better… right? Not so fast. When budget, scalability, scope, throughput, performance and security are a concern, as they should be, you need to think about agents.

The Workstation Monitoring Imperative
You’ve just discovered a breach and are hunting down the forensic chain of events of an APT when the trail goes cold. Why? Because it started on a workstation. Learn how to cover them.

XDR & Sysmon – How Snare Can Help
Snare XDR and Sysmon
Threat detection software has evolved significantly…
August 3, 2021/by Steve ChallansThreat detection software has evolved significantly…

Snare Detection for Mimikatz PrintNightmare
Background on the Print Spooler Vulnerability
The recent threat…
July 7, 2021/by Steve ChallansThe recent threat…

Australian Cyber Security Centre Essential 8 Controls and Snare
June 14, 2021/by Steve Challans
LGA 2022 Annual Conference and Exhibition
April 11, 2022/by Nicholas Murphy
Prophecy International Appoints Bill Jessen as Head of Snare U.S. Federal Team
Prophecy International (AXS:PRO) has announced the appointment…
March 7, 2022/by Paige Montgomery
“LOG4J” Vulnerability and Snare
The latest cyber vulnerability that lies in the Log4j open…
December 14, 2021/by Steve ChallansProducts
Recent Posts
- The 5 Logs Most Often Missing During Breach Investigations
- The Cyber Volume Crisis: Why Modern Security Teams Are Drowning in Data — and What to Do About It
- Snare’s ISO 27001 Certification & Commitment to Cyber Security Continues in 2025
- Visibility Starts at the Source: How Snare Agent v5.10 Standardises Global Security Operations
- Cyber Resilience: When “Detect & Recover” Beats “Prevent & Protect”
- How the Cyber 4Cs Help Security Leaders Build a Resilient Logging Strategy


