Insights

Expert insights & Resources

Stay informed with our library of in-depth articles, cybersecurity news, threat analyses, case studies, and expert perspectives from the Lockbase team.

Talk to an Expert
man on computer
Graph - Relationship - Path

Attack Paths, Blast Radius, and the Graph That Connects Everything

Security is not just a graph problem during investigation. It is a graph problem before, during, and after the breach. The previous post focused on w...
,

Why Your SIEM Shows You Trees When You Need to See the Forest

Security analysts spend their days staring at tables. Rows and columns of log entries, each one a discrete event frozen in time. User authenticated. ...
,

What You Can Actually Do With 12 Years of Security Data

Most security teams are operating with institutional amnesia. Not by choice, but by architecture. You keep 90 days of logs because that's what the bu...
,

The Real Cost of Security Visibility (And Why It's About to Change)

There's a conversation happening in every security operations center that nobody wants to have. It usually starts during budget planning, surfaces ag...
,

Microsoft Sentinel's Transformation: Why This Changes Everything for Security Operations

Did you catch Microsoft Secure on September 30, 2025? Have you seen What's new in Sentinel? Something fundamental just shifted in the security operat...
,
group of people looking at a computer

Deploying Microsoft Defender for Endpoint with CrowdStrike (or any EDR)

At LockBase Cyber, we work with organizations of varying sizes, industries, levels of sophistication, and maturity. In conversations about Microsoft ...
, ,
chevron-down