Learn
Meet Cyber Security Data Quality Manager, Carmen Silva
As part of a series called “Meet our Deeps,” we introduce you to Carmen Silva, a cyber security data quality manager …
Read MoreThe Best Threat Intelligence Programs Answer these 3 Questions
Questions related to how security leaders can create the best threat intelligence programs for their organizations we…
Read MoreDeep Dive of Intrusion at Customer in Architecture and Enginee…
DeepSeas analysts identified an unspecified threat actor conducting post-compromise activities in an Architecture and…
Read MoreThe Confusion Between Attack Surface Reduction and Vulnerabili…
Attack Surface Reduction was recently covered in an episode of Cyber Security America with our own Deep, Josh Nichols…
Read MoreAlert Prioritization & Potential Hidden Risks: A Primer fo…
Some security leaders have had alert prioritization decisions made for them. Others are dealing with decisions that w…
Read MoreMeet Our Deep: Richard Waller, DeepSeas Cyber Security Account…
Today, as part of a DeepSeas series called “Meet our Deeps,” we introduce you to Richard Waller, a DeepSeas Cyber Sec…
Read MoreMeet Our Deep Cyber Security Experts: Ruben Mbon, CISSP, GCPM,…
In a DeepSeas series titled “Meet Our Deeps,” we introduce you to our cyber security experts who are serving in the c…
Read MoreOneNote Files Used for Malware Delivery, Actors Iterate Rapidly
OneNote Files Used for Malware Delivery, Actors Iterate Rapidly A DeepSeas Summary DeepSeas has identified a new tech…
Read MoreFAA Reporting System Failure Grounding US Flights | DeepSeas A…
Yesterday was the first Patch Tuesday of the year, which some may speculate to be the cause of the FAA System Failure…
Read MoreThe DeepSeas are calling.
Book your virtual consult.
You pick the time and day. We’ll be ready to answer your questions.