Latest Insights
All Topics
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- Cybersecurity News
- Education
- C-Suite Accountability
- Security Hygiene
- Endpoint Detection and Response
- Ransomware
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
Cybersecurity Industry
Threat Intelligence
The 5 Most Gruesome Cyber Threats
Endpoint Detection and Response
Cybersecurity Industry
A Smarter Way to Detect Suspicious Cloud Logins
As more organizations move their operations online, cloud accounts have become increasingly popular targets for cybercriminals. These adversaries use phishing, password-based attacks, or other methods to gain illegitimate access. The ideal place to detect account takeover, or “ATO”, is at the login..
Cybersecurity Industry
The Deficiency of Mean Time Metrics in Cybersecurity
How many times have you struggled with the question: what does success look like? At ActZero, our data-driven approach to cybersecurity invites us to grapple daily with measuring and evaluating the work we do on behalf of our customers. Like many, we first turned toward the standard metrics used in..
Threat Intelligence
Threat Modeling: A Guide for Small to Midsize Enterprises
In the non-stop battle to keep your organization secure, there are three vital commodities most IT and security teams seem to never have enough of — time, resources, and money. With a sundry of risks and vulnerabilities to track and remediate, how can a team focus their efforts for maximum impact,..
Regulatory Compliance
6 SOC2 Questions to Ask Your Security Provider
IT leaders assess security providers based on certain criteria, i.e., cost, capabilities, and vector coverage. Trust is leveraged in this assessment, especially if referral-based. However, when it pertains to protecting your business assets i.e., sensitive data, due diligence is key. Not validating..
Cybersecurity Industry
Why Securing Against IT Supply Chain Attacks is Crucial
Recent high profile attacks have compromised the IT supply chain; targeting ubiquitous pieces of software to attack companies using said software. This creates a widespread opportunity for hackers, between the exploit’s creation, detection and remediation (patching) of such IT supply chain..
Cybersecurity Industry
Why the Microsoft Cloud is So Hard to Secure
As the reality of remote work spurs more organizations to make the transition to the cloud, Microsoft’s solutions are an increasingly popular choice. The company reached a 20 percent share of the worldwide cloud market for the first time in 2020, with 63 percent of businesses — and 95 percent of..
Cybersecurity Industry
Managed Detection and Response
How to Choose an MDR Provider
Managed detection and response (MDR) providers are becoming increasingly popular with small-to-medium sized business and mid-market companies alike.
Cybersecurity Industry
Managed Detection and Response
Why More Cybersecurity Threats Since WFH?
As you may have noticed from the headlines, security incidents have increased significantly since the pandemic began. For a start, complaints to the FBI’s Cyber Division are up 400% from before the COVID-19 pandemic and come especially from small and medium-sized businesses.
Cybersecurity Industry
C-Suite Accountability
Diagnosing Your “Cybersecurity Anxiety”
There’s too many reasons for sleepless nights nowadays. Cyber risk does not have to be one of them.
Managed Detection and Response
IntelliGO Acquired by ActZero
It’s not often we get to make an announcement quite this exciting: IntelliGO Networks has been acquired by ActZero, a Palo Alto-based artificial intelligence company! You can check out the press release here.
Assess Outcomes (Not Features)
Managed Detection and Response
Assessing Business Outcomes of Cybersecurity
We examine the specific outcomes that cybersecurity solutions should be driving for your small to mid-sized enterprise. This should help you to assess your existing cybersecurity solutions, determine the impact of potential solutions, and ultimately highlight the value and necessity of..
C-Suite Accountability
Why Every Leadership Meeting Should Include a Cybersecurity Update
As part of our “C-Suite Accountability” theme, we explore why holding senior executives accountable is a necessary motivator in the prioritization, development, and adoption of cybersecurity initiatives across the small to medium-sized organization. In this post, we cover the importance of..
Security Takes a Village
Cybersecurity Skills Shortage: A Hiring Manager’s Perspective
As part of our “security takes a village” focus, we are exploring how stakeholders other than a dedicated cybersecurity or IT team can help keep your organization secure. In this post, Alyssa Miller, ActZero Networks’ Human Resources Manager, discusses a cybersecurity consideration with..
Cybersecurity News
European GDPR - Are You Prepared?
The European General Data Protection Regulation (GDPR) comes into effect on May 25, 2018, impacting not only countries within the European Union (EU), but all companies that hold the personal data of EU residents, regardless of the company’s actual location. The GDPR will introduce stringent..