6 results
- NewsInvestigating Microsoft 365 Direct Send Abuse: When Convenience Becomes a Vulnerability
Real-World Impact: Get to Answers in Minutes, not Hours
October 2025 · 8 min readRead → - InvestigationsInvestigating Locked Accounts: Making sense of the canary in the coal mine
Streamlining locked account investigations with Command Zero
March 2025 · 5 min readRead → - ProductEmail Investigations: The Epicenter of Security Analysis
The hard truth: Emails are full user identities
February 2025 · 6 min readRead → - InvestigationsInvestigations lack consistency, documentation and auditabilityNovember 2024 · 8 min readRead →
- ResearchUniversal talent gap in cybersecurity hinders the ability to run investigationsOctober 2024 · 6 min readRead →
- ResearchTransforming cyber investigations: The power of asking the right questions
In the ever-evolving landscape of cybersecurity, the complexity and volume of threats continue to escalate.
July 2024 · 11 min readRead →
Get Started
See what your team can achieve.
Live in under an hour. No migration. No friction.
Book a DemoNo training data requiredSOC 2 CompliantDirect-to-data





