- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Threat Intelligence
- Data Protection
- Regulatory Compliance
- Security Takes a Village
- C-Suite Accountability
- Endpoint Detection and Response
- Cybersecurity News
- Security Hygiene
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
- Success Stories
6 SOC2 Questions to Ask Your Security Provider
IT leaders assess security providers based on certain criteria, i.e., cost, capabilities, and vector coverage. Trust is leveraged in this assessment, especially if referral-based. However, when it pertains to protecting your business assets i.e., sensitive data, due diligence is key. Not validating..
Virtual Roundtable: Cybersecurity Essentials for the New Normal
The digital landscape drastically changed as organizations moved workers from inside their corporate networks to their homes and into the cloud. Unfortunately, malicious actors quickly learned to take advantage of the new environments, and cybersecurity incidents increased dramatically. And, it’s..
How Data Science Can Save You From a Heuristics Headache
With the over-hype of AI, it’s tough to blame people for thinking that they might be able to achieve a similar outcome using rules or basic statistics (the folks you should really blame are the marketing people!) … That being said, in this blog post I’m going to explain why these simple heuristics..
Why Securing Against IT Supply Chain Attacks is Crucial
Recent high profile attacks have compromised the IT supply chain; targeting ubiquitous pieces of software to attack companies using said software. This creates a widespread opportunity for hackers, between the exploit’s creation, detection and remediation (patching) of such IT supply chain..
Why the Microsoft Cloud is So Hard to Secure
As the reality of remote work spurs more organizations to make the transition to the cloud, Microsoft’s solutions are an increasingly popular choice. The company reached a 20 percent share of the worldwide cloud market for the first time in 2020, with 63 percent of businesses — and 95 percent of..
Security Hygiene Virtual CISO Cybersecurity Industry
Configuring for Security: 4 Free and Simple Steps
IT managers are the design architects of information and security networks. When furnished with the required resources and an expert team, they maintain daily operational stability. However, threat actors have advanced through the years, and become skilled at deploying long cycle attacks, one of..
Cybersecurity Industry Threat Intelligence
Early Detection of Exchange Zero Day? Hindsight Indicators
In hindsight, it should have been easy to find the needle in the haystack of haystacks...
Cybersecurity Industry Threat Intelligence Managed Detection and Response Data Protection
Zero Ransom Initiative
Our goal as a company is to get our customers to zero... zero breaches, zero threats, zero vulnerabilities, zero inadequate cybersecurity controls. We’ve committed to achieve this by continually investing to outpace the adversary across our technology, people and processes. Today, I’m excited to..
Cybersecurity Industry Regulatory Compliance
How CMMC Helps with Multiple Compliance Certifications
The Cybersecurity Maturity Model Certification (cmmc 2.0) cmmc 2.0 is a ‘gold standard’ for developing the maturity of your cybersecurity. And because cmmc 2.0 requirements serve as that gold standard, cmmc 2.0 can also guide your compliance efforts across other frameworks, ensuring maximum..
Security Hygiene Cybersecurity Industry Threat Intelligence Managed Detection and Response Security Takes a Village
Combating a Rise in Ransomware: A Roundtable Discussion
Addressing ransomware has never been more of a top priority for senior IT leaders than it is today. Ransomware can be devastating to both individuals and organizations, and many organizations have been put in a position to pay millions of dollars to recover their data and deal with the implications..
Cybersecurity Industry Managed Detection and Response Data Protection
The Resurgence of Removable Hardware Threats
The use of external devices is more and more common these days. Even before the pandemic, external devices like USB keys and external hard drives allowed employees to easily take their projects with them when they were on the go.But with their widespread use, externals are a huge target for malware..
Cybersecurity Industry Threat Intelligence Managed Detection and Response
Protect Your Office 365 Accounts from Takeover
Workforces are becoming more distributed due to the pandemic or the desire to hire the best talent wherever in the world it may be. In turn, many are moving their operations into the cloud, starting with email, being one of the most common applications. Many companies that use Microsoft Exchange..
Cybersecurity Industry Managed Detection and Response Cybersecurity News
Are You Responding to Script Lines, or Headlines?
We see breaches disclosed in the news media more and more often these days. It can have a less-than-ideal impact on concerned stakeholders at companies. This impact is often heightened if the breach is at an organization in your industry, is otherwise high-profile, in your local geography, or if..
Cybersecurity Industry Managed Detection and Response
A New Type of Cybersecurity Company
Today, we’re launching ActZero, a new type of cybersecurity company whose mission is to make exceptional cybersecurity accessible to small and mid-sized enterprises. The need could not be more clear: Increasingly sophisticated attacks are targeting organizations of all sizes, leveraging..
Cybersecurity Industry Managed Detection and Response
7 Lessons Learned from SMB Cybersecurity Leaders
While I might not be in the IT trenches, over my years in sales I have had the benefit of working alongside IT leaders across multiple industries. I’ve learned first-hand about the problems IT leaders face in their everyday cybersecurity operations.