Knowledge Library

Security intelligence from practitioners who've seen it firsthand.

White papers, case studies, and free tools built from 15 years of real-world engagements — not repurposed vendor content.

Research

White Papers

Request Custom Research →
White Paper

The Self-Service SOC: How End-Users Became Our Most Effective Defense Layer

How closing the helpdesk loop with identity-direct threat notification cut mean response time from hours to under 5 minutes across government and healthcare client environments.

36 pages · Mar 2025Download arrow_forward
White Paper

Identity Is the Perimeter: Why Your SIEM Needs a Biometric Layer

Technical guide to deploying MYID Self Verify for closed-loop identity threat response. Covers vendor-agnostic integration with your existing IdP and SIEM or XDR, Autopilot configuration, self-service account management rollout, and user adoption patterns.

32 pages · Jan 2025Download arrow_forward
White Paper

County Government Cybersecurity: The Threats Virginia and Maryland Agencies Face in 2025

Sector-specific threat analysis for local government agencies. Covers ransomware targeting patterns, credential theft via citizen-facing portals, and AI-assisted phishing campaigns.

44 pages · Feb 2025Download arrow_forward
Proof Points

Case Studies

Case Study

County Government: Ransomware Precursor Caught in 48 Hours That Sat Undetected for 9 Days

A Virginia county government onboarded SPS SOC with an existing environment. Within 48 hours our team identified a Cobalt Strike beacon that had been present for nine days. The threat was contained before encryption began. The county's exposure included all constituent payment records and HR data.

County Government · Virginia · 2024Read Study arrow_forward
Case Study

Senior Living Org: MYID Self Verify Reduces Identity Threat Response from 4 Hours to 4 Minutes

A Maryland senior living organization was experiencing credential-based attacks against its resident and staff portals. After deploying MYID Self Verify with SOC integration, identity threat response dropped from an average of 4 hours to under 4 minutes — with no helpdesk involvement required.

Senior Living · Maryland · 2024Read Study arrow_forward
Free Resources

Free Tools and Templates

quiz

SOC Maturity Self-Assessment

40-question assessment covering people, process, and technology. Benchmarked against 200+ SPS-audited environments. Generates a scored gap analysis.

Access Tool →
checklist

Incident Response Runbook Templates

10 documented IR runbooks used in production SPS SOC environments. Ransomware, credential theft, DDoS, insider threat, and more.

Download →
grid_view

MITRE ATT&CK Coverage Calculator

Map your SIEM detection rules to ATT&CK techniques. Visualize coverage gaps. Export as heatmap or CSV for leadership reporting.

Access Tool →
fingerprint

Try MYID Self Verify — Free Trial

Experience the full identity threat response workflow — threat detection, biometric verification, Autopilot, self-service account management — against a simulated environment. No production risk, no commitment.

From the Blog

Security Intelligence

01
SOC Operations

Why Your False Positive Rate Is a Strategy Problem, Not a Technology Problem

Alert fatigue kills security teams before attackers do. We examine the organizational failures that lead to noise accumulation and share the operational approach that gets clients below 0.5% false positive rates.

March 18, 2025 · 9 min read
02
Identity Security

4-Minute Identity Threat Response: The QRadar + MYID Self Verify Closed Loop

A walkthrough of the integration architecture that enables sub-5-minute identity offense closure without analyst intervention. Data from production county government environments.

March 5, 2025 · 7 min read
03
Red Team

Kerberoasting in 2025: Why 80% of the Enterprise Networks We Test Still Fall to This

Despite years of guidance, most enterprise AD environments remain trivially vulnerable. Our red team lead explains what defenders keep getting wrong and how to fix it in one sprint.

Feb 19, 2025 · 14 min read