Latest Insights

Blog

Recall & Precision: Not the Whole Story on Cybersecurity Machine Learning Models

Data scientist Brenna Gibbons asserts that Recall and Precision, two measures often referenced by security vendors touting the efficacy of machine learning models, aren't as relevant as sampling methods when evaluating solutions.
Recall & Precision: Not the Whole Story on Cybersecurity Machine Learning Models
Blog

How to Disrupt Quantum Locker Ransomware TTPs

In this detailed breakdown of the tactics, techniques and procedures (TTPs) leveraged by Quantum Locker Ransomware, Sean Hittel explains why detections are insufficient, and TTPs should be treated as part of an attack chain.
How to Disrupt Quantum Locker Ransomware TTPs
Blog

Tenets of Incident Response Postmortem (RCA)

If postmortems are already part of your security procedures, read on to ensure you’re making the most of them by adhering to best practices.
Tenets of Incident Response Postmortem (RCA)
Blog

Why Ransomware-as-a-Service is a Problem

We’ve seen ransomware evolve technologically, and tactically. We discuss one such evolution, why this particular one warrants our attention, and steps we can take to mitigate its impact.
Why Ransomware-as-a-Service is a Problem
Blog

4 Ways to Stop Ransomware on the Endpoint

vCISO, Adam Mansour, breaks down how we stop ransomware on your operating systems with our agent.
4 Ways to Stop Ransomware on the Endpoint
Blog

Ransomware Task Force: A Year of Action

Ransomware Task Force (RTF) member Aaron McIntosh offers key takeaways from the 'Combating Ransomware: A Year of Action' event in Washington, DC.
Ransomware Task Force: A Year of Action
Blog

No Case for Security Budget? Demand Participation Instead

Jennifer Mitchell, Chief of Staff, covers vital functions that you can access as somebody in security, IT, or leadership to expand your cybersecurity posture through people and participation.
No Case for Security Budget? Demand Participation Instead
Blog

The Role of Artificial Intelligence in Protecting Healthcare Networks

Demystify AI's role in cybersecurity, assess its maturity across different technologies and find out where it's applicable and where it isn't.
The Role of Artificial Intelligence in Protecting Healthcare Networks
Blog

Cybersecurity: It’s Not Just for CISOs Anymore (and Never Was)

Teams need to work together toward the common goals of protecting the organization and furthering its prevention posture, but how? Learn more here.
Cybersecurity: It’s Not Just for CISOs Anymore (and Never Was)
Blog

Diversity, Equity, and Inclusion (DE&I) Strategic and Actionable Insights

Learn how ActZero started a purposeful, iterative plan for infusing DE&I into our company culture and workflow, resulting in increased morale and high productivity.
Diversity, Equity, and Inclusion (DE&I) Strategic and Actionable Insights
Blog

Inclusive Talent Acquisition

We are moving the dial on inclusive and transparent hiring practices. Here is how. 1) Bringing the human touch back to business.
Inclusive Talent Acquisition
Blog

Your Security Operation Needs Data Science — But It Isn’t That Simple

In this blog, we'd like to further explore data science by looking at some of the biggest challenges CIOs and CISOs face, and why you can’t simply flick a switch to use data to magically solve these problems.
Your Security Operation Needs Data Science — But It Isn’t That Simple
Blog

Achieving Unity Across Piecemeal Cybersecurity Solutions

Without efficient cybersecurity practices, your teams can’t be effective—at least not for long. Here’s our look at the reasons your security is inefficient and steps you can take to fix the problem.
Achieving Unity Across Piecemeal Cybersecurity Solutions
Blog

Why a Carrot Beats a Stick in Cybersecurity Breach Insurance

Insurers taking a “stick” approach make cyber breach insurance too expensive for SMBs. We outline “carrot” incentives to lower risk & keep insurance affordable.
Why a Carrot Beats a Stick in Cybersecurity Breach Insurance
Blog

Cybersecurity Budget vs Cross-vector Coverage

To build an effective security strategy and reduce risk across your entire organization, IT leaders need to prioritize threat intelligence, data monitoring and proactive preparedness. Read more here for insights.
Cybersecurity Budget vs Cross-vector Coverage
123