Latest Insights

Blog

Protect your supply chain from attacks like Kaseya Ransomware

In this blog, we use the most recent Kaseya VSA attack as an example of a supply chain attack and use it as an illustration of why supply chain attacks require special security considerations as well as offer guidelines as to how to protect against these attacks.
Protect your supply chain from attacks like Kaseya Ransomware
Blog

Using Data Science and Automation to Combat Alert Fatigue

It’s no secret that midsize enterprises are struggling with the overwhelming demands of modern cybersecurity. In this blog, we dive into using data science and automation to combat alert fatigue.
Using Data Science and Automation to Combat Alert Fatigue
Blog

Why You Should Think Like A Hacker

The attacker vs defender mindset must be pervasive in the design, implementation and testing of every security technology for it to be successful.
Why You Should Think Like A Hacker
Blog

Optimal Security Alerts: Specific, Relevant, Actionable, Scalable

We explain why not all alerts are created equal, and what makes for an informative and actionable alert.
Optimal Security Alerts: Specific, Relevant, Actionable, Scalable
Blog

Threat Modeling: A Guide for Small to Midsize Enterprises

In this blog post, we describe the tangible effect security controls should yield - practices enabling risk reduction; and introduce some Threat Modeling frameworks that you can draw upon.
Threat Modeling: A Guide for Small to Midsize Enterprises
Blog

4 Ways to Stop Ransomware on the Endpoint

vCISO, Adam Mansour, breaks down how we stop ransomware on your operating systems with our agent.
4 Ways to Stop Ransomware on the Endpoint
Blog

Four Criteria for a Successful Security Portal

In this blog post, we discuss the advantages a well-developed security dashboard can empart to developing organizations and IT teams.
Four Criteria for a Successful Security Portal
Blog

Despite the Hype, EDR Alone Won’t Save You

Adam Mansour describes EDR, including reasons it’s insufficient on its own to protect your business.
Despite the Hype, EDR Alone Won’t Save You
Blog

6 SOC2 Questions to Ask Your Security Provider

There are many criteria IT leaders consider when assessing their security providers...
6 SOC2 Questions to Ask Your Security Provider
Blog

Virtual Roundtable: Cybersecurity Essentials for the New Normal

In partnership with the IT Media Group, we brought together 12 cross-industry IT executives for a virtual roundtable. The session provided an opportunity to focus on the top cybersecurity issues that organizations face.
Virtual Roundtable: Cybersecurity Essentials for the New Normal
Blog

How Data Science Can Save You From a Heuristics Headache

We explain why simple heuristics will pale in comparison to what a proper data science-fueled machine learning algorithm can do.
How Data Science Can Save You From a Heuristics Headache
Blog

Why Securing Against IT Supply Chain Attacks is Crucial

In this post, we separate the IT or software supply chain from the traditional supply chain - as both are targeted separately, and there are different means to mitigate such risks.
Why Securing Against IT Supply Chain Attacks is Crucial
Blog

Why the Microsoft Cloud is So Hard to Secure

In this blog post, we’ll look at why securing the Microsoft cloud is particularly challenging for the IT teams of small or midsize organizations.
Why the Microsoft Cloud is So Hard to Secure
Blog

Configuring for Security: 4 Free and Simple Steps

Here are four simple, inexpensive suggestions to fortify your systems just by properly configuring your existing technology and fully using the tools that come with your operating system.
Configuring for Security: 4 Free and Simple Steps
Blog

Early Detection of Exchange Zero Day? Hindsight Indicators

In security, the game is not only finding the needle in a haystack, not only knowing which haystack to look in… but knowing how to prioritize and act on each of those needles.
Early Detection of Exchange Zero Day? Hindsight Indicators
123