Latest Insights
All Topics
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- C-Suite Accountability
- Endpoint Detection and Response
- Cybersecurity News
- Ransomware
- Security Hygiene
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
- Success Stories
Data Protection
Revolutionizing School Cybersecurity: Harnessing AI to Combat Cyber Threats to Protect Student Data
As technology integrates deeper into the curriculum, the responsibility of protecting sensitive data and ensuring a secure learning environment rests heavily on the shoulders of tech directors. In an era where attackers are employing sophisticated AI tools to enhance their tactics, school district..
Cybersecurity Industry
The Most Vulnerable Cybersecurity Targets for School Districts
The rise of technology has opened incredible opportunities for schools, giving students globally a chance to learn more than ever before. Yet, this shift has also made schools a target for cyberattacks. Between 2016 and 2022, the threat of cyberattacks in schools has grown significantly, turning..
Cybersecurity Industry
Regulatory Compliance
Time’s Up On TikTok In Corporate Environments
Several governments around the world have or are considering banning the Chinese-owned social media app TikTok from government mobile devices as it presents an “unacceptable level of risk to privacy and security.” Canada is the latest of a number of governments to take this action. And the United..
Cybersecurity Industry
Don’t Let Microsoft OneNote Documents Become Your One Recurring Nightmare
Discovering threat actors accessing your environment is difficult. When they are cleverly disguised in one of your organization's trusted applications, it’s even harder - and your adversaries are counting on organizations not to pick up on the nuances.
Cybersecurity Industry
How to Better Protect Your IT Supply Chain From Cyber Attack
This post is part of our special eBook, 6 Steps to Secure your IT Supply Chain. You can download the entire eBook here.
Cybersecurity Industry
Security Takes a Village
Tenets of Incident Response Postmortem (RCA)
As IT leaders, we invest in people, processes, and technology to prevent cybersecurity incidents, and to plan for potential threats and attacks. But despite our best efforts, we encounter situations that lead to exposed vulnerabilities, hacked systems, and stolen data. The threat, regardless of..
Cybersecurity Industry
Cybersecurity Budget vs Cross-vector Coverage
Thanks to modern technology, there’s an abundance of tools and services that can help organizations identify and respond to cyberthreats with confidence. Yet, a recent survey from the International Data Group found that almost 80% of senior IT security leaders are concerned that their enterprises..
Cybersecurity Industry
What Is an Impossible Cybersecurity Trade-Off?
Cybersecurity is an all-over kind of problem. You need to be prepared for anything because attackers can change their strategies on a dime.
Cybersecurity Industry
Managed Detection and Response
log4shell: Patch Necessary, but Insufficient - Proactive Steps Required
December 30th, 2021 Update: Apache released another new version (2.17) after the previous patch was discovered to be vulnerableas well. This article has been updated to reflect the latest recommendations. It remains relevant for those looking to understand what measures beyond patching could be at..
Cybersecurity Industry
Threat Intelligence
The 5 Most Gruesome Cyber Threats
Endpoint Detection and Response
Cybersecurity Industry
A Smarter Way to Detect Suspicious Cloud Logins
As more organizations move their operations online, cloud accounts have become increasingly popular targets for cybercriminals. These adversaries use phishing, password-based attacks, or other methods to gain illegitimate access. The ideal place to detect account takeover, or “ATO”, is at the login..
Cybersecurity Industry
The Deficiency of Mean Time Metrics in Cybersecurity
How many times have you struggled with the question: what does success look like? At ActZero, our data-driven approach to cybersecurity invites us to grapple daily with measuring and evaluating the work we do on behalf of our customers. Like many, we first turned toward the standard metrics used in..
Threat Intelligence
Threat Modeling: A Guide for Small to Midsize Enterprises
In the non-stop battle to keep your organization secure, there are three vital commodities most IT and security teams seem to never have enough of — time, resources, and money. With a sundry of risks and vulnerabilities to track and remediate, how can a team focus their efforts for maximum impact,..
Regulatory Compliance
6 SOC2 Questions to Ask Your Security Provider
IT leaders assess security providers based on certain criteria, i.e., cost, capabilities, and vector coverage. Trust is leveraged in this assessment, especially if referral-based. However, when it pertains to protecting your business assets i.e., sensitive data, due diligence is key. Not validating..
Cybersecurity Industry
Why Securing Against IT Supply Chain Attacks is Crucial
Recent high profile attacks have compromised the IT supply chain; targeting ubiquitous pieces of software to attack companies using said software. This creates a widespread opportunity for hackers, between the exploit’s creation, detection and remediation (patching) of such IT supply chain..