Cyber Threats
Learning Center
Expand your cybersecurity knowledge with our robust library of articles on a variety of topics, including cyber threats, digital forensics, Microsoft security, and more.
![incident response plan for data breach](/assets/imager/imagess3/Heroes/257814/incident-response-plan-for-data-breach_385831371e0fd032ef3b6a3afa23ddf9.jpg 400w, /assets/imager/imagess3/Heroes/257814/incident-response-plan-for-data-breach_165059becc3e0edd115b9e109c59d8ec.jpg 600w, /assets/imager/imagess3/Heroes/257814/incident-response-plan-for-data-breach_d51353e53a2af317ed8b6308e9331fe7.jpg 800w, /assets/imager/imagess3/Heroes/257814/incident-response-plan-for-data-breach_fe7e0dcf7c05d7ec8e876b1d93b0742b.jpg 1200w)
Getting Started in Cyber Threats
![cyber threats cyber crime](/assets/imager/imagess3/Learning-Center/176286/cyber-threats-cyber-crime_04ca90de0b8ec23e6166bb3c1a78aafa.jpg 150w, /assets/imager/imagess3/Learning-Center/176286/cyber-threats-cyber-crime_799650da91b4f34df661e6d00d555b85.jpg 300w, /assets/imager/imagess3/Learning-Center/176286/cyber-threats-cyber-crime_58c51eeeb215a3d08724d6f037d80f28.jpg 450w)
Cyber Threats
5 Signs of a Phishing Email and How to Put a Stop to Phishing Attacks
Cyber Threats
8 Devastating Phishing Attack Examples (and Prevention Tips)
Cyber Threats
What Is an Attack Surface and 7 Ways to Minimize It
Getting Started in Digital Forensics
![digital cyber forensics incident response](/assets/imager/imagess3/Learning-Center/176508/digital-forensics_04ca90de0b8ec23e6166bb3c1a78aafa.jpg 150w, /assets/imager/imagess3/Learning-Center/176508/digital-forensics_799650da91b4f34df661e6d00d555b85.jpg 300w, /assets/imager/imagess3/Learning-Center/176508/digital-forensics_58c51eeeb215a3d08724d6f037d80f28.jpg 450w)
Digital Forensics
What is Digital Forensics and Incident Response (DFIR)?
Digital Forensics
Understanding Digital Forensics: Process, Techniques, and Tools
Digital Forensics
Digital Forensics: Get Started with These 9 Open Source Tools
Getting Started in Endpoint Security
![Endpoint protection](/assets/imager/imagess3/Learning-Center/226184/endpoint-protection_04ca90de0b8ec23e6166bb3c1a78aafa.jpg 150w, /assets/imager/imagess3/Learning-Center/226184/endpoint-protection_799650da91b4f34df661e6d00d555b85.jpg 300w, /assets/imager/imagess3/Learning-Center/226184/endpoint-protection_58c51eeeb215a3d08724d6f037d80f28.jpg 450w)
Endpoint Security
Complete Guide to Endpoint Security: Solutions and Best Practices
Endpoint Security
EDR Security: How EDR Supports an Endpoint Security Strategy
Endpoint Security
What Is an Endpoint Protection Platform (EPP)?
Endpoint Security
What Is Endpoint Protection? Solutions and Best Practices
Getting Started in Incident Response
![incident response retainer](/assets/imager/imagess3/Learning-Center/176577/incident-response_04ca90de0b8ec23e6166bb3c1a78aafa.jpg 150w, /assets/imager/imagess3/Learning-Center/176577/incident-response_799650da91b4f34df661e6d00d555b85.jpg 300w, /assets/imager/imagess3/Learning-Center/176577/incident-response_58c51eeeb215a3d08724d6f037d80f28.jpg 450w)
Incident Response
What is Incident Response? Process, Frameworks, and Tools
Incident Response
What is an Incident Response Policy and How to Create One
Incident Response
Incident Response Plan: Steps and 8 Critical Considerations
Incident Response
NIST Incident Response: Framework and Key Recommendations
Getting Started in MDR Security
![managed detection response mdr security](/assets/imager/imagess3/Learning-Center/176589/BV_LC_MDR-Security_04ca90de0b8ec23e6166bb3c1a78aafa.png 150w, /assets/imager/imagess3/Learning-Center/176589/BV_LC_MDR-Security_799650da91b4f34df661e6d00d555b85.png 300w, /assets/imager/imagess3/Learning-Center/176589/BV_LC_MDR-Security_58c51eeeb215a3d08724d6f037d80f28.png 450w)
MDR Security
Managed Security Services: MSP, MSSP, MDR, and More
MDR Security
Understanding MDR Security: Benefits and Core Technologies
MDR Security
What is Managed Detection and Response (MDR)?
MDR Security
What Are Managed Detection and Response (MDR) Services?
Getting Started in Microsoft Security
![microsoft security](/assets/imager/imagess3/Learning-Center/176592/BV_LC_MSFT_04ca90de0b8ec23e6166bb3c1a78aafa.png 150w, /assets/imager/imagess3/Learning-Center/176592/BV_LC_MSFT_799650da91b4f34df661e6d00d555b85.png 300w, /assets/imager/imagess3/Learning-Center/176592/BV_LC_MSFT_58c51eeeb215a3d08724d6f037d80f28.png 450w)
Microsoft Security
Microsoft Defender for Endpoint: Architecture, Features, and Plans
Microsoft Security
Microsoft Defender for Identity: Architecture and Key Capabilities
Microsoft Security
Microsoft 365 Defender
Microsoft Security
Microsoft Defender for Office 365: Workflow, Features, and Plans
Getting Started in Security Operations Center
![Security operations center](/assets/imager/imagess3/Learning-Center/176598/security-operations-center_04ca90de0b8ec23e6166bb3c1a78aafa.jpg 150w, /assets/imager/imagess3/Learning-Center/176598/security-operations-center_799650da91b4f34df661e6d00d555b85.jpg 300w, /assets/imager/imagess3/Learning-Center/176598/security-operations-center_58c51eeeb215a3d08724d6f037d80f28.jpg 450w)
Security Operations Center
What Is a Security Operations Center (SOC)?
Security Operations Center
4 Security Operations Center Frameworks You Should Know
Security Operations Center
SOC as a Service: Outsourcing Your Security Operations Center
Security Operations Center
What Is CISO as a Service (vCISO)?
Getting Started in Splunk SIEM
![Splunk siem](/assets/imager/imagess3/Learning-Center/177684/BV_LC_Splunk-SIEM_04ca90de0b8ec23e6166bb3c1a78aafa.png 150w, /assets/imager/imagess3/Learning-Center/177684/BV_LC_Splunk-SIEM_799650da91b4f34df661e6d00d555b85.png 300w, /assets/imager/imagess3/Learning-Center/177684/BV_LC_Splunk-SIEM_58c51eeeb215a3d08724d6f037d80f28.png 450w)
Splunk SIEM
Splunk SIEM with Splunk Enterprise, Cloud, and Splunk ES
Splunk SIEM
Understanding Splunk Cloud: Capabilities and Related Solutions
Splunk SIEM
Splunk Enterprise: Architecture, Features, and Capabilities
Splunk SIEM
Splunk Enterprise Security: Use Cases, Features, and Process
Getting Started in Third-Party Risk Management
![Third party risk management supply chain](/assets/imager/imagess3/Learning-Center/220755/BV_LC_Third-Party-Risk-Management_04ca90de0b8ec23e6166bb3c1a78aafa.png 150w, /assets/imager/imagess3/Learning-Center/220755/BV_LC_Third-Party-Risk-Management_799650da91b4f34df661e6d00d555b85.png 300w, /assets/imager/imagess3/Learning-Center/220755/BV_LC_Third-Party-Risk-Management_58c51eeeb215a3d08724d6f037d80f28.png 450w)
Third-Party Risk Management
Third-Party Risk Management (TPRM): A Complete Guide
Third-Party Risk Management
Third-Party Security: 5 Steps to Securing Your Ecosystem
Third-Party Risk Management
Third-Party Risk Assessment: A Practical Guide
Third-Party Risk Management
Supply Chain Risks, Threats, and Management Strategies
Getting Started in Threat Intelligence
![Threat intelligence](/assets/imager/imagess3/Learning-Center/177904/BV_LC_Threat-Intelligence_04ca90de0b8ec23e6166bb3c1a78aafa.png 150w, /assets/imager/imagess3/Learning-Center/177904/BV_LC_Threat-Intelligence_799650da91b4f34df661e6d00d555b85.png 300w, /assets/imager/imagess3/Learning-Center/177904/BV_LC_Threat-Intelligence_58c51eeeb215a3d08724d6f037d80f28.png 450w)
Threat Intelligence
Threat Intelligence: Complete Guide to Process and Technology
Threat Intelligence
Threat Hunting: How It Works and 4 Tips for Success
Threat Intelligence
Threat Intelligence Tools: Types, Benefits & Best Practices
Threat Intelligence
Threat Intelligence Feeds Explained
Getting Started in XDR
![Xdr extended detection response](/assets/imager/imagess3/Learning-Center/177990/BV_LC_XDR_04ca90de0b8ec23e6166bb3c1a78aafa.png 150w, /assets/imager/imagess3/Learning-Center/177990/BV_LC_XDR_799650da91b4f34df661e6d00d555b85.png 300w, /assets/imager/imagess3/Learning-Center/177990/BV_LC_XDR_58c51eeeb215a3d08724d6f037d80f28.png 450w)
XDR
What Is XDR (Extended Detection and Response)?
XDR
XDR Security: How Will XDR Impact Your SOC?
XDR
MDR vs XDR: Which Solution Will Save You More Time?
XDR