Latest Insights
All Topics
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- C-Suite Accountability
- Cybersecurity News
- Endpoint Detection and Response
- Security Hygiene
- Education
- Ransomware
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
Cybersecurity Industry
Security Takes a Village
Scale Your Security Operation by Focusing on SOCe
An efficient security operation center (SOC) is at the heart of any effort to scale your security operation.
Cybersecurity Industry
Three Key Attributes for Achieving Meaning in Cybersecurity
What’s the goal of our cybersecurity program? How much security do I need? Have I done everything necessary to protect my business?
Cybersecurity Industry
Protect your supply chain from attacks like Kaseya Ransomware
Supply chain attacks exist when a 3rd party’s software or hardware used in an organization’s processes are used to attack it. Because a supply chain attack is launched from a partner or peer, it is often extremely difficult to detect as it is delivered from a trusted channel. Additionally, by..
Cybersecurity Industry
Security Takes a Village
Using Data Science and Automation to Combat Alert Fatigue
It’s no secret that midsize enterprises are struggling with the overwhelming demands of modern cybersecurity.A perfect storm of factors has combined to make the lives of people trusted with securing organizations difficult. Threats are escalating in both complexity and severity — in 2020, the..
Why You Should Think Like A Hacker
The attacker vs defender mindset must be pervasive in the design, implementation and testing of every security technology for it to be successful. This isn’t just in thinking like an attacker, but also in welcoming outside testers to find flaws in implementations.As a security solution creator,..
Cybersecurity Industry
Optimal Security Alerts: Specific, Relevant, Actionable, Scalable
Part of my job as a Data Scientist at ActZero is to create smart high-fidelity detections, with fancy machine learning or with straightforward analytic rules. When these detections trigger, they usually send off an alert to one of our threat hunters, or directly to a customer’s IT point person. So..
Threat Intelligence
Threat Modeling: A Guide for Small to Midsize Enterprises
In the non-stop battle to keep your organization secure, there are three vital commodities most IT and security teams seem to never have enough of — time, resources, and money. With a sundry of risks and vulnerabilities to track and remediate, how can a team focus their efforts for maximum impact,..
Security Hygiene
Four Criteria for a Successful Security Portal
One of the largest frustrations I’ve heard from security industry professionals over the years is that they are under constant pressure to prove that the work they do, or the solutions they implement are making their business safer. Unfortunately, nearly 80% of senior IT and IS leaders believe..
Endpoint Detection and Response
Despite the Hype, EDR Alone Won’t Save You
So, you’re trying to protect your organization from cyberthreats, and you start looking at antivirus (AV)... Then, maybe you shift to general malware protection - and then a fully blown Enterprise Protection Platform (EPP), but that’s not enough either! Once you reach next-generation antivirus..
Regulatory Compliance
6 SOC2 Questions to Ask Your Security Provider
IT leaders assess security providers based on certain criteria, i.e., cost, capabilities, and vector coverage. Trust is leveraged in this assessment, especially if referral-based. However, when it pertains to protecting your business assets i.e., sensitive data, due diligence is key. Not validating..
Cybersecurity Industry
Virtual Roundtable: Cybersecurity Essentials for the New Normal
The digital landscape drastically changed as organizations moved workers from inside their corporate networks to their homes and into the cloud. Unfortunately, malicious actors quickly learned to take advantage of the new environments, and cybersecurity incidents increased dramatically. And, it’s..
Cybersecurity Industry
How Data Science Can Save You From a Heuristics Headache
With the over-hype of AI, it’s tough to blame people for thinking that they might be able to achieve a similar outcome using rules or basic statistics (the folks you should really blame are the marketing people!) … That being said, in this blog post I’m going to explain why these simple heuristics..
Cybersecurity Industry
Why Securing Against IT Supply Chain Attacks is Crucial
Recent high profile attacks have compromised the IT supply chain; targeting ubiquitous pieces of software to attack companies using said software. This creates a widespread opportunity for hackers, between the exploit’s creation, detection and remediation (patching) of such IT supply chain..
Cybersecurity Industry
Why the Microsoft Cloud is So Hard to Secure
As the reality of remote work spurs more organizations to make the transition to the cloud, Microsoft’s solutions are an increasingly popular choice. The company reached a 20 percent share of the worldwide cloud market for the first time in 2020, with 63 percent of businesses — and 95 percent of..
Security Hygiene
Virtual CISO
Cybersecurity Industry
Configuring for Security: 4 Free and Simple Steps
IT managers are the design architects of information and security networks. When furnished with the required resources and an expert team, they maintain daily operational stability. However, threat actors have advanced through the years, and become skilled at deploying long cycle attacks, one of..