
Post Breach (Conti) Remediation Assessment & Monitoring with Snare and Sysmon
Author: Rhys Thornton, Solutions Consultant (EMEA), Snare
Post-Breach…
September 30, 2021/by rhysthorntonPost-Breach…

Log Collection is Critical for Real-Time Threat Detection & Compliance
Log collection and storage integrity is critical for both accurate…
August 23, 2021/by Brad Thomas
XDR & Sysmon – How Snare Can Help
Snare XDR and Sysmon
Threat detection software has evolved significantly…
August 3, 2021/by Steve ChallansThreat detection software has evolved significantly…

State OIT Security Challenges and How to Solve Them
State Governments manage and must protect a wide range of citizen…
December 11, 2018/by Prophecy
Threat intelligence: the new security technology you’re about to hear a lot more about
In previous blogs, I’ve tongue-in-cheek (mostly) suggested…
September 26, 2018/by Prophecy
The Security of Everything
Unless you’ve been out of contact with civilisation for the…
August 31, 2018/by ProphecyProducts
Recent Posts
- The 5 Logs Most Often Missing During Breach Investigations
- The Cyber Volume Crisis: Why Modern Security Teams Are Drowning in Data — and What to Do About It
- Snare’s ISO 27001 Certification & Commitment to Cyber Security Continues in 2025
- Visibility Starts at the Source: How Snare Agent v5.10 Standardises Global Security Operations
- Cyber Resilience: When “Detect & Recover” Beats “Prevent & Protect”
- How the Cyber 4Cs Help Security Leaders Build a Resilient Logging Strategy


