Meet Cyber Security Data Quality Manager, Carmen Silva

As part of a series called “Meet our Deeps,” we introduce you to Carmen Silva, a cyber security data quality manager …

Read More

The Best Threat Intelligence Programs Answer these 3 Questions

Questions related to how security leaders can create the best threat intelligence programs for their organizations we…

Read More

Deep Dive of Intrusion at Customer in Architecture and Enginee…

DeepSeas analysts identified an unspecified threat actor conducting post-compromise activities in an Architecture and…

Read More

The Confusion Between Attack Surface Reduction and Vulnerabili…

Attack Surface Reduction was recently covered in an episode of Cyber Security America with our own Deep, Josh Nichols…

Read More

Alert Prioritization & Potential Hidden Risks: A Primer fo…

Some security leaders have had alert prioritization decisions made for them. Others are dealing with decisions that w…

Read More

Meet Our Deep: Richard Waller, DeepSeas Cyber Security Account…

Today, as part of a DeepSeas series called “Meet our Deeps,” we introduce you to Richard Waller, a DeepSeas Cyber Sec…

Read More

Meet Our Deep Cyber Security Experts: Ruben Mbon, CISSP, GCPM,…

In a DeepSeas series titled “Meet Our Deeps,” we introduce you to our cyber security experts who are serving in the c…

Read More

OneNote Files Used for Malware Delivery, Actors Iterate Rapidly

OneNote Files Used for Malware Delivery, Actors Iterate Rapidly A DeepSeas Summary DeepSeas has identified a new tech…

Read More

FAA Reporting System Failure Grounding US Flights | DeepSeas A…

Yesterday was the first Patch Tuesday of the year, which some may speculate to be the cause of the FAA System Failure…

Read More

The DeepSeas are calling.
Book your virtual consult.

You pick the time and day. We’ll be ready to answer your questions.

Book with Calendly