Popular Resources

Updated frequently, useful resources that can help you mature your security posture. Please borrow and share!

Previous
Next
Videos

Stay Alert: Hackers Love a Holiday Weekend Too

Holiday Hackers are on the rise. Log off with confidence with these expert cybersecurity tips.
Stay Alert: Hackers Love a Holiday Weekend Too
Videos

Actionable Safeguards: Containing and Recovering From Ransomware Attacks

Should it occur, members of the Ransomware Taskforce go deep into the Actionable Safeguards, which are responsive measures to help manage a ransomware attack.
Actionable Safeguards: Containing and Recovering From Ransomware Attacks
Videos

Actionable Safeguards: Protecting Your Org From Access Control Gaps, Misconfigurations & Outdated Software

The Blueprint for Ransomware Defense recommended actionable Safeguards to block a ransomware attack. But what are those Safeguards, and how can they be implemented? Learn more in Session 3.
Actionable Safeguards: Protecting Your Org From Access Control Gaps, Misconfigurations & Outdated Software
Videos

Foundational Safeguards: Building Resilience in the Face of a Ransomware Attack

If a ransomware attack occurs, how should organizations respond and recover? In Session 2/5 of our Blueprint for Ransomware Defense webinar series, we zero in on foundational safeguards to increase your preparedness.
Foundational Safeguards: Building Resilience in the Face of a Ransomware Attack
Videos

Foundational Safeguards: Building Your Cybersecurity Foundation

The Ransomware Task Force guides users and implementation specialists through the Blueprint’s various Safeguards.
Foundational Safeguards: Building Your Cybersecurity Foundation
Videos

Fireside Chat: The Collaborative Approach to Cybersecurity

Jennifer Mitchell, Chief of Staff and Gwen Way, Technical Account Team Manager with ActZero, discuss various applications of The Collaborative Approach to Cybersecurity.
Fireside Chat: The Collaborative Approach to Cybersecurity
Videos

How MDR Can Help Meet the Computer-Security Incident Notification Requirements

Kristen Yang, Senior SOC Analyst, explains the new joint ruling called the Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers, its requirements and who it applies to.
How MDR Can Help Meet the Computer-Security Incident Notification Requirements
Datasheet

Log Search Module

ActZero has launched our new Log Search Module to provide our clients with efficient storage, fast search, and flexible visualization. Read our Datasheet for more information.
Log Search Module
Datasheet

Ransomware Readiness Results Comparison

ActZero has discovered that, on average, its MDR services could detect and block a class-leading 89% of all standard and recent ransomware events techniques and tactics, including emerging threats. Our average dwell time was less than 17 minutes. Read more here for details.
Ransomware Readiness Results Comparison
123