Sentinel Playbook September 26, 2025 Ingesting MuleSoft Audit and Sign-In Logs into Microsoft Sentinel When enterprise security teams need to expand visibility into critical platforms, data ingestion playbooks can… Shannon Evans Love0
Employee Voice July 11, 2025 How I Learned to Prioritize in Cybersecurity—and Why It Changed Everything By Julian Costache, Cybersecurity Engineer I didn’t plan on working in cybersecurity. My path wasn’t… Shannon Evans Love0
Sentinel Playbook June 19, 2025 Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden.… Shannon Evans Love0
Sentinel Playbook June 4, 2025 Making Cloud Risk Data Actionable in Sentinel: A Playbook for CSPM Integration The Posture Visibility Problem CrowdStrike Cloud Security Posture Management (CSPM) provides critical visibility into misconfigurations—such… Shannon Evans Love0
Employee VoiceZero Trust May 12, 2025 Breaking the Friction Cycle: How True Integration Strengthens Security and Streamlines Access Shannon Evans, Director of Marketing, Accelerynt Starting my new role as Director of Marketing at… Shannon Evans Love0
SecurityTechnology April 3, 2025 Integrating CrowdStrike Alerts with Microsoft Sentinel: Streamlining Threat Visibility When Security Tools Don’t Talk to Each Other Managing multiple security tools shouldn’t feel like… Shannon Evans Love0