Tools

Updated frequently, useful resources that can help you mature your security posture. Please borrow and share!

Previous
Next

Latest Insights

Blog

Why Securing Against IT Supply Chain Attacks is Crucial

In this post, we separate the IT or software supply chain from the traditional supply chain - as both are targeted separately, and there are different means to mitigate such risks.
Why Securing Against IT Supply Chain Attacks is Crucial
Blog

Why the Microsoft Cloud is So Hard to Secure

In this blog post, we’ll look at why securing the Microsoft cloud is particularly challenging for the IT teams of small or midsize organizations.
Why the Microsoft Cloud is So Hard to Secure
Blog

Configuring for Security: 4 Free and Simple Steps

Here are four simple, inexpensive suggestions to fortify your systems just by properly configuring your existing technology and fully using the tools that come with your operating system.
Configuring for Security: 4 Free and Simple Steps
Blog

Early Detection of Exchange Zero Day? Hindsight Indicators

In security, the game is not only finding the needle in a haystack, not only knowing which haystack to look in… but knowing how to prioritize and act on each of those needles.
Early Detection of Exchange Zero Day? Hindsight Indicators
Blog

Zero Ransom Initiative

Chris Finan, COO at ActZero.ai, shares insights into one of our highest priority investments: advanced ransomware protection.
Zero Ransom Initiative
Blog

How CMMC Helps with Multiple Compliance Certifications

This blog post offers five steps you can take to leverage CMMC to guide both your CMMC compliance and compliance across other frameworks.
How CMMC Helps with Multiple Compliance Certifications
Blog

Combating a Rise in Ransomware: A Roundtable Discussion

Emily Bertrand, shares the output from ActZero’s Ransomware Roundtable, which included over 30 IT Leaders. Check out the four themes that resonated most.
Combating a Rise in Ransomware: A Roundtable Discussion
Blog

The Resurgence of Removable Hardware Threats

The use of external devices is more and more common these days. Ryan Masrani, Threat Hunter at ActZero.ai, gives a breakdown on removable hardware threats, including strategies to keep your systems safe.
The Resurgence of Removable Hardware Threats
Blog

Protect Your Office 365 Accounts from Takeover

If you are planning on using O365, these are the things you need to do to secure your O365 accounts.
Protect Your Office 365 Accounts from Takeover
Blog

Why Ransomware-as-a-Service is a Problem

We’ve seen ransomware evolve technologically, and tactically. We discuss one such evolution, why this particular one warrants our attention, and steps we can take to mitigate its impact.
Why Ransomware-as-a-Service is a Problem
Blog

Are You Responding to Script Lines, or Headlines?

We see breaches disclosed in the news media more and more often these days. It can have a less-than-ideal impact on concerned stakeholders at companies. This impact is often heightened if the breach is at an organization in your industry, is otherwise high-profile, in your local geography...
Are You Responding to Script Lines, or Headlines?
Blog

A New Type of Cybersecurity Company

Today, we’re launching ActZero, a new type of cybersecurity company whose mission is to make exceptional cybersecurity accessible to small and mid-sized enterprises.
A New Type of Cybersecurity Company
Blog

7 Lessons Learned from SMB Cybersecurity Leaders

Sharing my lessons learned from cybersecurity and IT leaders after years of conversations around their top issues.
7 Lessons Learned from SMB Cybersecurity Leaders
Blog

The Traditional SOC Is Dead, Long Live the Remote SOC

Check out changes that make for a modern SOC, and the drawbacks of the (now, dying) traditional one.
The Traditional SOC Is Dead, Long Live the Remote SOC
Blog

Discussing Cybersecurity Outcomes (Not Features) with CIOs

One of the biggest lessons when selling technology is learning how to talk to your prospects, and gearing the conversation towards what is important to a prospective buyer.
Discussing Cybersecurity Outcomes (Not Features) with CIOs
123