- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Threat Intelligence
- Data Protection
- Regulatory Compliance
- Security Takes a Village
- C-Suite Accountability
- Endpoint Detection and Response
- Cybersecurity News
- Security Hygiene
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
- Success Stories
Top 3 Takeaways from ActZero’s Fireside Chat on Cybersecurity Essentials
Security leaders often struggle to create efficient and effective security operations that will stop the adversary. As the business and threat landscape evolves, many throw junior people and tools like EDRs and SIEMs at the problem to try to keep pace, but mid-sized organizations are falling..
Why Darktrace Installs a Hooli Box
When you hear cybersecurity firm Darktrace’s customers talk about their experience with the company, they will tell you about ‘the box’ from Darktrace they installed. The idea behind the box is that it allows you to see malicious network traffic and coordinate to the cloud directly so you can react..
Endpoint Detection and Response Cybersecurity Industry
A Smarter Way to Detect Suspicious Cloud Logins
As more organizations move their operations online, cloud accounts have become increasingly popular targets for cybercriminals. These adversaries use phishing, password-based attacks, or other methods to gain illegitimate access. The ideal place to detect account takeover, or “ATO”, is at the login..
The Deficiency of Mean Time Metrics in Cybersecurity
How many times have you struggled with the question: what does success look like? At ActZero, our data-driven approach to cybersecurity invites us to grapple daily with measuring and evaluating the work we do on behalf of our customers. Like many, we first turned toward the standard metrics used in..
Cybersecurity Industry Security Takes a Village
Scale Your Security Operation by Focusing on SOCe
An efficient security operation center (SOC) is at the heart of any effort to scale your security operation.
Three Key Attributes for Achieving Meaning in Cybersecurity
What’s the goal of our cybersecurity program? How much security do I need? Have I done everything necessary to protect my business?
Protect your supply chain from attacks like Kaseya Ransomware
Supply chain attacks exist when a 3rd party’s software or hardware used in an organization’s processes are used to attack it. Because a supply chain attack is launched from a partner or peer, it is often extremely difficult to detect as it is delivered from a trusted channel. Additionally, by..
Cybersecurity Industry Security Takes a Village
Using Data Science and Automation to Combat Alert Fatigue
It’s no secret that midsize enterprises are struggling with the overwhelming demands of modern cybersecurity.A perfect storm of factors has combined to make the lives of people trusted with securing organizations difficult. Threats are escalating in both complexity and severity — in 2020, the..
Why You Should Think Like A Hacker
The attacker vs defender mindset must be pervasive in the design, implementation and testing of every security technology for it to be successful. This isn’t just in thinking like an attacker, but also in welcoming outside testers to find flaws in implementations.As a security solution creator,..
Optimal Security Alerts: Specific, Relevant, Actionable, Scalable
Part of my job as a Data Scientist at ActZero is to create smart high-fidelity detections, with fancy machine learning or with straightforward analytic rules. When these detections trigger, they usually send off an alert to one of our threat hunters, or directly to a customer’s IT point person. So..
Threat Modeling: A Guide for Small to Midsize Enterprises
In the non-stop battle to keep your organization secure, there are three vital commodities most IT and security teams seem to never have enough of — time, resources, and money. With a sundry of risks and vulnerabilities to track and remediate, how can a team focus their efforts for maximum impact,..
Four Criteria for a Successful Security Portal
One of the largest frustrations I’ve heard from security industry professionals over the years is that they are under constant pressure to prove that the work they do, or the solutions they implement are making their business safer. Unfortunately, nearly 80% of senior IT and IS leaders believe..
Endpoint Detection and Response
Despite the Hype, EDR Alone Won’t Save You
So, you’re trying to protect your organization from cyberthreats, and you start looking at antivirus (AV)... Then, maybe you shift to general malware protection - and then a fully blown Enterprise Protection Platform (EPP), but that’s not enough either! Once you reach next-generation antivirus..