Latest Insights

Blog

Ransomware Alert: Hackers Love a Long Weekend Too

Long weekends are prime time for cyberattacks. Keep hackers out with these safeguards.
Ransomware Alert: Hackers Love a Long Weekend Too
Blog

On Ransomware: Government Strategy and Secret Service Tactics

A candid discussion brimmed with actionable insights for frontline cybersecurity leaders. Includes curated resources on how to harden your network and defense.
On Ransomware: Government Strategy and Secret Service Tactics
Blog

Can Your Financial Firm Report Breaches in 36 Hours or Less?

Adam Mansour explores new 36-hour breach notification requirements of Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers in a joint ruling from the FDIC, FRB and OCC. He offers KPIs that bank service providers can consider to assess their readiness for such requirements.
Can Your Financial Firm Report Breaches in 36 Hours or Less?
Blog

Cybersecurity in Financial Services: How to Protect Your Business From a Data Breach

This blog will cover three cybersecurity incidents, the lessons learned, and how Managed Detection & Response (MDR) can optimize your financial institution's defense capabilities.
Cybersecurity in Financial Services: How to Protect Your Business From a Data Breach
Blog

Why ActZero Won Best MDR Service

ActZero describes the differentiators that contributed to being named Best MDR Service of 2022 by SC Awards. Consider such capabilities when evaluating an MDR service for your company.
Why ActZero Won Best MDR Service
Blog

Key Considerations for Healthcare When Choosing a Cybersecurity Partner

With something so critical to your organization's safety, what are the top things one needs to look at when choosing cybersecurity vendors and partners? Learn more here.
Key Considerations for Healthcare When Choosing a Cybersecurity Partner
Blog

What Healthcare Can Learn From Finance About Cybersecurity

What can healthcare learn from banks and financial services companies to help better secure their networks, and protect their employees, partners, and patients? Learn more here.
What Healthcare Can Learn From Finance About Cybersecurity
Blog

Penetration Testing vs Readiness Assessments: The Ultimate Test of Your Defenses

Unsurprisingly, you’ve spoken with multiple MSSPs about pen-testing. Its popularity makes it the obvious choice. But with vendor-funded assessments available, why pay top dollar? In this blog, we talk about alternatives. Starting with the basics of penetration testing.
Penetration Testing vs Readiness Assessments: The Ultimate Test of Your Defenses
Blog

6 Easy Ways to Detect Healthcare Data Breaches

Cyber-attacks on healthcare dominate recent news, and ransomware attacks are among the most troubling. How can you tell if you’ve been compromised? Read on to learn more.
6 Easy Ways to Detect Healthcare Data Breaches
Blog

MDR: An Origin Story

Distinguished Security Engineer Sean Hittel offers an insider look at Managed Detection and Response (MDR) cybersecurity. He examines the ever-evolving battle between attackers and defenders and the historical context and technologies that brought their respective advantages.
MDR: An Origin Story
Blog

Recall & Precision: Not the Whole Story on Cybersecurity Machine Learning Models

Data scientist Brenna Gibbons asserts that Recall and Precision, two measures often referenced by security vendors touting the efficacy of machine learning models, aren't as relevant as sampling methods when evaluating solutions.
Recall & Precision: Not the Whole Story on Cybersecurity Machine Learning Models
Blog

How to Disrupt Quantum Locker Ransomware TTPs

In this detailed breakdown of the tactics, techniques and procedures (TTPs) leveraged by Quantum Locker Ransomware, Sean Hittel explains why detections are insufficient, and TTPs should be treated as part of an attack chain.
How to Disrupt Quantum Locker Ransomware TTPs
Blog

Tenets of Incident Response Postmortem (RCA)

If postmortems are already part of your security procedures, read on to ensure you’re making the most of them by adhering to best practices.
Tenets of Incident Response Postmortem (RCA)
Blog

Why Ransomware-as-a-Service is a Problem

We’ve seen ransomware evolve technologically, and tactically. We discuss why this particular one warrants our attention, and steps we can take to mitigate its impact.
Why Ransomware-as-a-Service is a Problem
Blog

4 Ways to Stop Ransomware on the Endpoint

CSO Adam Mansour breaks down four ways we stop ransomware on the endpoint.
4 Ways to Stop Ransomware on the Endpoint
123