Dan Ortega

Dan Ortega is the Director of Product Marketing at Anomali and has broad and deep experience in marketing with both SecOps and ITOps companies, including multiple Fortune 500 companies and successful start-ups. He is actively engaged with traditional and social media initiatives, and writes extensively across a broad range of security and information technology topics.

More From This author

Compliance and Governance in Vulnerability Management: Meeting Regulatory Mandates With Confidence
Compliance and Governance in Vulnerability Management: Meeting Regulatory Mandates With Confidence
Published on:
March 3, 2025
Blog

Compliance and Governance in Vulnerability Management: Meeting Regulatory Mandates With Confidence

Read More
SOC Strategies for DORA: How to Build Resilience That Lasts
SOC Strategies for DORA: How to Build Resilience That Lasts
Published on:
February 5, 2025
Blog

SOC Strategies for DORA: How to Build Resilience That Lasts

Read More
Strengthening ITSM with Actionable Threat Intelligence
Strengthening ITSM with Actionable Threat Intelligence
Published on:
January 22, 2025
Blog

Strengthening ITSM with Actionable Threat Intelligence

Read More
The Ultimate Power Couple: Infrastructure Management and SIEM for Cyber Success
The Ultimate Power Couple: Infrastructure Management and SIEM for Cyber Success
Published on:
December 18, 2024
Blog

The Ultimate Power Couple: Infrastructure Management and SIEM for Cyber Success

Read More
The Synergy Between Monitoring, Alerting, and Threat Intelligence: Enhancing Security and Operational Resilience
The Synergy Between Monitoring, Alerting, and Threat Intelligence: Enhancing Security and Operational Resilience
Published on:
December 12, 2024
Blog

The Synergy Between Monitoring, Alerting, and Threat Intelligence: Enhancing Security and Operational Resilience

Read More
Understanding the Similarities and Differences of Monitoring and Observability
Understanding the Similarities and Differences of Monitoring and Observability
Published on:
December 3, 2024
Blog

Understanding the Similarities and Differences of Monitoring and Observability

Read More
Cyber Threat Hunting: Step-by-Step Guide and Best Practices
Cyber Threat Hunting: Step-by-Step Guide and Best Practices
Published on:
November 20, 2024
Blog

Cyber Threat Hunting: Step-by-Step Guide and Best Practices

Read More
5 Crucial Use Cases for Threat Intelligence Platforms
5 Crucial Use Cases for Threat Intelligence Platforms
Published on:
November 8, 2024
Blog

5 Crucial Use Cases for Threat Intelligence Platforms

Read More
How to Create a Threat Model: Step-by-Step Guide and Best Practices
How to Create a Threat Model: Step-by-Step Guide and Best Practices
Published on:
November 6, 2024
Blog

How to Create a Threat Model: Step-by-Step Guide and Best Practices

Read More
The Intersection of SecOps and ITOps: The New BFFs
The Intersection of SecOps and ITOps: The New BFFs
Published on:
November 4, 2024
Blog

The Intersection of SecOps and ITOps: The New BFFs

Read More
Anomali Outpaces Modern Threats with Quantum-Quick Security Analytics
Anomali Outpaces Modern Threats with Quantum-Quick Security Analytics
Published on:
October 30, 2024
Blog

Anomali Outpaces Modern Threats with Quantum-Quick Security Analytics

Read More
Understanding SIEM and XDR: A Comprehensive Comparison for Security Operations Centers
Understanding SIEM and XDR: A Comprehensive Comparison for Security Operations Centers
Published on:
October 24, 2024
Blog

Understanding SIEM and XDR: A Comprehensive Comparison for Security Operations Centers

Read More
The MITRE ATT&CK Framework: A Deep Dive into Its Development, Applications, and Future Evolution
The MITRE ATT&CK Framework: A Deep Dive into Its Development, Applications, and Future Evolution
Published on:
October 17, 2024
Blog

The MITRE ATT&CK Framework: A Deep Dive into Its Development, Applications, and Future Evolution

Read More
How AI is Driving the Evolution of Threat Intelligence
How AI is Driving the Evolution of Threat Intelligence
Published on:
October 16, 2024
Blog

How AI is Driving the Evolution of Threat Intelligence

Read More
Leveraging Data Enrichment in Cyber Threat Intelligence (CTI)
Leveraging Data Enrichment in Cyber Threat Intelligence (CTI)
Published on:
October 3, 2024
Blog

Leveraging Data Enrichment in Cyber Threat Intelligence (CTI)

Read More
An Overview of Query Languages Used in Cybersecurity and SIEM
An Overview of Query Languages Used in Cybersecurity and SIEM
Published on:
September 27, 2024
Blog

An Overview of Query Languages Used in Cybersecurity and SIEM

Read More
A Deep Dive into Different Types of Threat Intelligence
A Deep Dive into Different Types of Threat Intelligence
Published on:
September 18, 2024
Blog

A Deep Dive into Different Types of Threat Intelligence

Read More
Understanding the Differences and Similarities Between SIEM and SOAR
Understanding the Differences and Similarities Between SIEM and SOAR
Published on:
September 9, 2024
Blog

Understanding the Differences and Similarities Between SIEM and SOAR

Read More
Top Three Cybersecurity Concerns and What to Do About Them
Top Three Cybersecurity Concerns and What to Do About Them
Published on:
July 17, 2024
Blog

Top Three Cybersecurity Concerns and What to Do About Them

Read More
Dealing with Security Threats at Scale
Dealing with Security Threats at Scale
Published on:
July 5, 2024
Blog

Dealing with Security Threats at Scale

Read More
Cybersecurity Priorities 2024 Report: Top 10 Takeaways
Cybersecurity Priorities 2024 Report: Top 10 Takeaways
Published on:
April 22, 2024
Blog

Cybersecurity Priorities 2024 Report: Top 10 Takeaways

Read More
Top 10 Cybersecurity Trends and What You Need to Do about Them Now
Top 10 Cybersecurity Trends and What You Need to Do about Them Now
Published on:
April 8, 2024
Blog

Top 10 Cybersecurity Trends and What You Need to Do about Them Now

Read More
Demystifying Cybersecurity Threat Models: A Natural Language Approach
Demystifying Cybersecurity Threat Models: A Natural Language Approach
Published on:
March 12, 2024
Blog

Demystifying Cybersecurity Threat Models: A Natural Language Approach

Read More
Transformative Power: AI-Generated Executive Summaries for Cybersecurity Indicators of Compromise (IOCs)
Transformative Power: AI-Generated Executive Summaries for Cybersecurity Indicators of Compromise (IOCs)
Published on:
March 4, 2024
Blog

Transformative Power: AI-Generated Executive Summaries for Cybersecurity Indicators of Compromise (IOCs)

Read More
The Imperative for Real-time Speed and Unlimited Lookbacks
The Imperative for Real-time Speed and Unlimited Lookbacks
Published on:
February 29, 2024
Blog

The Imperative for Real-time Speed and Unlimited Lookbacks

Read More
Shining a Light on Dark Data
Shining a Light on Dark Data
Published on:
January 3, 2024
Blog

Shining a Light on Dark Data

Read More
Beyond SQL: Leveraging Natural Language Processing for Enhanced Cybersecurity and Threat Management
Beyond SQL: Leveraging Natural Language Processing for Enhanced Cybersecurity and Threat Management
Published on:
November 20, 2023
Blog

Beyond SQL: Leveraging Natural Language Processing for Enhanced Cybersecurity and Threat Management

Read More
AI’s Critical Role in a Curated Cybersecurity Ecosystem
AI’s Critical Role in a Curated Cybersecurity Ecosystem
Published on:
November 14, 2023
Blog

AI’s Critical Role in a Curated Cybersecurity Ecosystem

Read More
The Smarter Path Beyond Legacy SIEMs
The Smarter Path Beyond Legacy SIEMs
Published on:
September 7, 2023
Blog

The Smarter Path Beyond Legacy SIEMs

Read More
How GPT and Security Analytics accelerates Cybercrime Investigations
How GPT and Security Analytics accelerates Cybercrime Investigations
Published on:
August 9, 2023
Blog

How GPT and Security Analytics accelerates Cybercrime Investigations

Read More
Explore More Resources