Read or download all Datashield news, reviews, content, and more.
Dave Norlin is the Chief Information Security Officer at Datashield and contributes technical content to the Datashield resource library. On top of running the SOC at Datashield and interfacing with customers, Dave offers his technical acumen and insight in the form of educational materials for the Datashield resource library. Dave is also one of the hosts of Datashield's podcast The Hash-Time Show.
Two more security issues announced surrounding Remote Code Execution against Remote Desktop Services. Microsoft released a notice today concerning two vulnerabilities, which would result in a Remote Code Execution vulnerability against the Remote Desktop Services. These are being tracked under CVE-2019-1181 and CVE-2019-1182. This is akin the previous vulnerability that we notified you on, CVE-2019-0708, aka Bluekeep.
Learn why packet level detail and full packet capture are critical to the forensic capabilities of a security analyst. Listed below are the top 7 reasons why packets are superior to logs alone.
Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.
Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)
The Difference Between Cybersecurity & Network Security
Datashield, a Lumifi company, has been a leading managed cybersecurity services provider for over a decade. Our consultative process and approach to managed detection and response help our clients establish a truly resilient cybersecurity strategy.
Providing Managed Detection and Response (MDR), Outsourced SOC, SOC as a Service, Threat Hunting, Threat Validation, Threat Remediation, Endpoint Detection and Response (EDR), Email Protection, Device Configuration & Tuning, Vulnerability Management, Perimeter Defense and more.