
Ransomware: What’s To Come
January 26, 2022/by rhysthornton
“LOG4J” Vulnerability and Snare
The latest cyber vulnerability that lies in the Log4j open…
December 14, 2021/by Steve Challans
Veracode Case Study: Prophecy International
December 13, 2021/by Paige Montgomery
How Snare Helps with DNS CISA Directives
As many know, the US Cyber Command issued a recent emergency…
March 20, 2019/by Steve Challans
The Log Collection Paradox
How good data management applies to log collection.
I love…
March 13, 2019/by Chris ConleyI love…

Data Breach Reporting & PIPEDA
The new reality for Canadian businesses
The Personal Information…
February 7, 2019/by Brad ThomasThe Personal Information…
Products
Recent Posts
- The 5 Logs Most Often Missing During Breach Investigations
- The Cyber Volume Crisis: Why Modern Security Teams Are Drowning in Data — and What to Do About It
- Snare’s ISO 27001 Certification & Commitment to Cyber Security Continues in 2025
- Visibility Starts at the Source: How Snare Agent v5.10 Standardises Global Security Operations
- Cyber Resilience: When “Detect & Recover” Beats “Prevent & Protect”
- How the Cyber 4Cs Help Security Leaders Build a Resilient Logging Strategy


