Latest Insights

Blog

Key Considerations for Healthcare When Choosing a Cybersecurity Partner

With something so critical to your organization's safety, what are the top things one needs to look at when choosing cybersecurity vendors and partners? Learn more here.
Key Considerations for Healthcare When Choosing a Cybersecurity Partner
Blog

What Healthcare Can Learn From Finance About Cybersecurity

What can healthcare learn from banks and financial services companies to help better secure their networks, and protect their employees, partners, and patients? Learn more here.
What Healthcare Can Learn From Finance About Cybersecurity
Blog

Penetration Testing vs Readiness Assessments: The Ultimate Test of Your Defenses

Unsurprisingly, you’ve spoken with multiple MSSPs about pen-testing. Its popularity makes it the obvious choice. But with vendor-funded assessments available, why pay top dollar? In this blog, we talk about alternatives. Starting with the basics of penetration testing.
Penetration Testing vs Readiness Assessments: The Ultimate Test of Your Defenses
Blog

6 Easy Ways to Detect Healthcare Data Breaches

Cyber-attacks on healthcare dominate recent news, and ransomware attacks are among the most troubling. How can you tell if you’ve been compromised? Read on to learn more.
6 Easy Ways to Detect Healthcare Data Breaches
Blog

MDR: An Origin Story

Distinguised Security Engineer, Sean Hittel offers an insider look at the cybersecurity category of Managed Detection and Response (MDR). He examines the ever-evolving battle between attackers and defenders, and the historical context and technologies that brought about their respective advantages.
MDR: An Origin Story
Blog

Recall & Precision: Not the Whole Story on Cybersecurity Machine Learning Models

Data scientist Brenna Gibbons asserts that Recall and Precision, two measures often referenced by security vendors touting the efficacy of machine learning models, aren't as relevant as sampling methods when evaluating solutions.
Recall & Precision: Not the Whole Story on Cybersecurity Machine Learning Models
Blog

How to Disrupt Quantum Locker Ransomware TTPs

In this detailed breakdown of the tactics, techniques and procedures (TTPs) leveraged by Quantum Locker Ransomware, Sean Hittel explains why detections are insufficient, and TTPs should be treated as part of an attack chain.
How to Disrupt Quantum Locker Ransomware TTPs
Blog

Tenets of Incident Response Postmortem (RCA)

If postmortems are already part of your security procedures, read on to ensure you’re making the most of them by adhering to best practices.
Tenets of Incident Response Postmortem (RCA)
Blog

Why Ransomware-as-a-Service is a Problem

We’ve seen ransomware evolve technologically, and tactically. We discuss why this particular one warrants our attention, and steps we can take to mitigate its impact.
Why Ransomware-as-a-Service is a Problem
Blog

4 Ways to Stop Ransomware on the Endpoint

CSO Adam Mansour breaks down four ways we stop ransomware on the endpoint.
4 Ways to Stop Ransomware on the Endpoint
Blog

Ransomware Task Force: A Year of Action

Ransomware Task Force (RTF) member Aaron McIntosh offers key takeaways from the 'Combating Ransomware: A Year of Action' event in Washington, DC.
Ransomware Task Force: A Year of Action
Blog

No Case for Security Budget? Demand Participation Instead

Jennifer Mitchell, Chief of Staff, covers vital functions that you can access as somebody in security, IT, or leadership to expand your cybersecurity posture through people and participation.
No Case for Security Budget? Demand Participation Instead
Blog

The Role of Artificial Intelligence in Protecting Healthcare Networks

Demystify AI's role in cybersecurity, assess its maturity across different technologies and find out where it's applicable and where it isn't.
The Role of Artificial Intelligence in Protecting Healthcare Networks
Blog

Cybersecurity: It’s Not Just for CISOs Anymore (and Never Was)

Teams need to work together toward the common goals of protecting the organization and furthering its prevention posture, but how? Learn more here.
Cybersecurity: It’s Not Just for CISOs Anymore (and Never Was)
Blog

Diversity, Equity, and Inclusion (DE&I) Strategic and Actionable Insights

Learn how ActZero started a purposeful, iterative plan for infusing DE&I into our company culture and workflow, resulting in increased morale and high productivity.
Diversity, Equity, and Inclusion (DE&I) Strategic and Actionable Insights
123