Meet Senior Service Delivery Coordinator, Erika Ambrose | Deep…

Senior Service Delivery Coordinator, Erika Ambrose, is featured in a DeepSeas series called, “Meet our Deeps.” Let’s …

Read More

Transforming a Cybersecurity Program: Top 5 Best Practices

The utilization of effective cyber defense tools and techniques – including best practices for building a cybersecuri…

Read More

Meet Cybersecurity Engineer, Hannah Thompson

As part of a series called “Meet our Deeps,” we introduce you to Hannah Thompson, a cybersecurity engineer at DeepSea…

Read More

Meet Cybersecurity Data Quality Manager, Carmen Silva

As part of a “Meet our Deeps” series, we introduce you to Carmen Silva, a cybersecurity data quality manager at DeepS…

Read More

The Best Threat Intelligence Programs Answer these 3 Questions

Questions related to how security leaders can create the best threat intelligence programs for their organizations we…

Read More

Analysis of Cyber Threat Actor Intrusion in an Architecture an…

DeepSeas analysts identified an unspecified cyber threat actor conducting post-compromise activities in a company wit…

Read More

The Confusion Between Attack Surface Reduction and Vulnerabili…

Attack surface reduction was recently covered in an episode of Cybersecurity America with Josh. In his work with clie…

Read More

SOC Alert Prioritization & Potential Hidden Risks

Some security leaders have had SOC alert prioritization decisions made for them. Others are dealing with decisions th…

Read More

Meet Our Deep: Richard Waller, DeepSeas Cybersecurity Account …

Today, as part of a DeepSeas series called “Meet our Deeps,” we introduce you to Richard Waller, a DeepSeas Cybersecu…

Read More

The DeepSeas are calling.
Book your virtual consult.

You pick the time and day. We’ll be ready to answer your questions.

Book with Calendly