Latest Insights

Blog

4 Ways to Stop Ransomware on the Endpoint

vCISO, Adam Mansour, breaks down how we stop ransomware on your operating systems with our agent.
4 Ways to Stop Ransomware on the Endpoint
Blog

Four Criteria for a Successful Security Portal

In this blog post, we discuss the advantages a well-developed security dashboard can empart to developing organizations and IT teams.
Four Criteria for a Successful Security Portal
Blog

Despite the Hype, EDR Alone Won’t Save You

Adam Mansour describes EDR, including reasons it’s insufficient on its own to protect your business.
Despite the Hype, EDR Alone Won’t Save You
Blog

6 SOC2 Questions to Ask Your Security Provider

There are many criteria IT leaders consider when assessing their security providers...
6 SOC2 Questions to Ask Your Security Provider
Blog

Virtual Roundtable: Cybersecurity Essentials for the New Normal

In partnership with the IT Media Group, we brought together 12 cross-industry IT executives for a virtual roundtable. The session provided an opportunity to focus on the top cybersecurity issues that organizations face.
Virtual Roundtable: Cybersecurity Essentials for the New Normal
Blog

How Data Science Can Save You From a Heuristics Headache

We explain why simple heuristics will pale in comparison to what a proper data science-fueled machine learning algorithm can do.
How Data Science Can Save You From a Heuristics Headache
Blog

Why Securing Against IT Supply Chain Attacks is Crucial

In this post, we separate the IT or software supply chain from the traditional supply chain - as both are targeted separately, and there are different means to mitigate such risks.
Why Securing Against IT Supply Chain Attacks is Crucial
Blog

Why the Microsoft Cloud is So Hard to Secure

In this blog post, we’ll look at why securing the Microsoft cloud is particularly challenging for the IT teams of small or midsize organizations.
Why the Microsoft Cloud is So Hard to Secure
Blog

Configuring for Security: 4 Free and Simple Steps

Here are four simple, inexpensive suggestions to fortify your systems just by properly configuring your existing technology and fully using the tools that come with your operating system.
Configuring for Security: 4 Free and Simple Steps
Blog

Early Detection of Exchange Zero Day? Hindsight Indicators

In security, the game is not only finding the needle in a haystack, not only knowing which haystack to look in… but knowing how to prioritize and act on each of those needles.
Early Detection of Exchange Zero Day? Hindsight Indicators
Blog

Zero Ransom Initiative

Chris Finan, COO at ActZero.ai, shares insights into one of our highest priority investments: advanced ransomware protection.
Zero Ransom Initiative
Blog

How CMMC Helps with Multiple Compliance Certifications

This blog post offers five steps you can take to leverage CMMC to guide both your CMMC compliance and compliance across other frameworks.
How CMMC Helps with Multiple Compliance Certifications
Blog

Combating a Rise in Ransomware: A Roundtable Discussion

Emily Bertrand, shares the output from ActZero’s Ransomware Roundtable, which included over 30 IT Leaders. Check out the four themes that resonated most.
Combating a Rise in Ransomware: A Roundtable Discussion
Blog

The Resurgence of Removable Hardware Threats

The use of external devices is more and more common these days. Ryan Masrani, Threat Hunter at ActZero.ai, gives a breakdown on removable hardware threats, including strategies to keep your systems safe.
The Resurgence of Removable Hardware Threats
Blog

Protect Your Office 365 Accounts from Takeover

If you are planning on using O365, these are the things you need to do to secure your O365 accounts.
Protect Your Office 365 Accounts from Takeover
123