Latest Insights
Blog
Recall & Precision: Not the Whole Story on Cybersecurity Machine Learning Models
Data scientist Brenna Gibbons asserts that Recall and Precision, two measures often referenced by security vendors touting the efficacy of machine learning models, aren't as relevant as sampling methods when evaluating solutions.
Blog
How to Disrupt Quantum Locker Ransomware TTPs
In this detailed breakdown of the tactics, techniques and procedures (TTPs) leveraged by Quantum Locker Ransomware, Sean Hittel explains why detections are insufficient, and TTPs should be treated as part of an attack chain.
Blog
Tenets of Incident Response Postmortem (RCA)
If postmortems are already part of your security procedures, read on to ensure you’re making the most of them by adhering to best practices.
Blog
Why Ransomware-as-a-Service is a Problem
We’ve seen ransomware evolve technologically, and tactically. We discuss one such evolution, why this particular one warrants our attention, and steps we can take to mitigate its impact.
Blog
4 Ways to Stop Ransomware on the Endpoint
vCISO, Adam Mansour, breaks down how we stop ransomware on your operating systems with our agent.
Blog
Ransomware Task Force: A Year of Action
Ransomware Task Force (RTF) member Aaron McIntosh offers key takeaways from the 'Combating Ransomware: A Year of Action' event in Washington, DC.
Blog
No Case for Security Budget? Demand Participation Instead
Jennifer Mitchell, Chief of Staff, covers vital functions that you can access as somebody in security, IT, or leadership to expand your cybersecurity posture through people and participation.
Blog
The Role of Artificial Intelligence in Protecting Healthcare Networks
Demystify AI's role in cybersecurity, assess its maturity across different technologies and find out where it's applicable and where it isn't.
Blog
Cybersecurity: It’s Not Just for CISOs Anymore (and Never Was)
Teams need to work together toward the common goals of protecting the organization and furthering its prevention posture, but how? Learn more here.
Blog
Diversity, Equity, and Inclusion (DE&I) Strategic and Actionable Insights
Learn how ActZero started a purposeful, iterative plan for infusing DE&I into our company culture and workflow, resulting in increased morale and high productivity.
Blog
Inclusive Talent Acquisition
We are moving the dial on inclusive and transparent hiring practices. Here is how. 1) Bringing the human touch back to business.
Blog
Your Security Operation Needs Data Science — But It Isn’t That Simple
In this blog, we'd like to further explore data science by looking at some of the biggest challenges CIOs and CISOs face, and why you can’t simply flick a switch to use data to magically solve these problems.
Blog
Achieving Unity Across Piecemeal Cybersecurity Solutions
Without efficient cybersecurity practices, your teams can’t be effective—at least not for long. Here’s our look at the reasons your security is inefficient and steps you can take to fix the problem.
Blog
Why a Carrot Beats a Stick in Cybersecurity Breach Insurance
Insurers taking a “stick” approach make cyber breach insurance too expensive for SMBs. We outline “carrot” incentives to lower risk & keep insurance affordable.
Blog
Cybersecurity Budget vs Cross-vector Coverage
To build an effective security strategy and reduce risk across your entire organization, IT leaders need to prioritize threat intelligence, data monitoring and proactive preparedness. Read more here for insights.
123