Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Creating Custom Dashboards in UTMStack

In this video, I walk you through the process of creating custom dashboards and visualizations in UTMStack SIEM. I demonstrate how to build various types of visualizations, such as pie charts and bar charts, to effectively display alert data. I also highlight the importance of adding filters for better data management and how to set up auto-refresh for real-time monitoring. Please make sure to follow along and try creating your own dashboards as we go through the steps together!

Managing False Positives and Alert Fatigue in SIEM

In this video, I walk you through the process of managing false positives in the UTMSatck platform. We often encounter numerous false positives when starting with a new SIEM, which can lead to confusion and unnecessary alerts. I demonstrate how to tag these false positives effectively and filter them out to streamline our alert system. Please make sure to implement the tagging rules I discussed to help reduce noise in your SOC team's workflow.

CMMC Compliance Automation in the SIEM

In this video, I walk you through the essentials of UTMStack compliance automation, specifically focusing on CMMC compliance. I explain how to navigate the compliance menu and ensure the correct framework is selected. I also highlight the automatic evaluation of controls and the options available for exporting reports. Please make sure to review the controls and provide any necessary evidence if the system indicates non-compliance.

How to Achieve PCI DSS 4.0 with Feroot AI JS Monitoring

The web has evolved—and so have its risks. Today’s web pages are built with dozens of party scripts for ads, analytics, and dynamic features. While these improve user experience, they also open the door to cyber threats, especially when handling credit card data. As attackers increasingly target browsers rather than servers, the challenge of client-side security has grown into a critical concern for security and compliance teams.

Protecting Client Data: How User Activity Monitoring (UAM) Supports Compliance in Financial Services

Financial services firms are among the most highly regulated and risk-sensitive environments. User activity monitoring, compliance, and audit readiness are essential for protecting client data and maintaining operational integrity. With sensitive client data, critical financial systems, and increasingly complex compliance mandates, firms need more than traditional IT security tools. They need operational insight into user activity across their digital environment.

How AI is Changing The Way We Manage Cyber Exposure

Artificial intelligence isn’t just a buzzword in cybersecurity—it’s rapidly becoming the backbone of both offense and defense in the digital battlefield. From hyper-realistic deepfakes to machine learning-powered threat detection, AI is fundamentally changing how we manage cyber exposure.

A Complete Guide to Endpoint Detection and Response (EDR)

Cyber threats aren’t slowing down—and endpoints are often the first target. That’s why having strong visibility and control at the device level has never been more important. Endpoint Detection and Response (EDR) is key in today’s security strategies. It helps teams spot, investigate, and respond to threats in real time—before they turn into bigger problems.

Demo Tuesday | Change Management

Network changes are hard, but cleaning up unused routing policy config from devices? That's PUNISHING. If you find yourself frozen in fear, not knowing what the downstream effect is of removing that config, then tune in for the Season 2 opener of Demo Tuesday, where Mike will do the unthinkable — cleanup old routing policy configuration. See how Forward Enterprise can eliminate your fear!