Latest Insights
cybersecurity industry
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- C-Suite Accountability
- Endpoint Detection and Response
- Cybersecurity News
- Ransomware
- Security Hygiene
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
- Success Stories
Endpoint Detection and Response
Cybersecurity Industry
A Smarter Way to Detect Suspicious Cloud Logins
As more organizations move their operations online, cloud accounts have become increasingly popular targets for cybercriminals. These adversaries use phishing, password-based attacks, or other methods to gain illegitimate access. The ideal place to detect account takeover, or “ATO”, is at the login..
Cybersecurity Industry
The Deficiency of Mean Time Metrics in Cybersecurity
How many times have you struggled with the question: what does success look like? At ActZero, our data-driven approach to cybersecurity invites us to grapple daily with measuring and evaluating the work we do on behalf of our customers. Like many, we first turned toward the standard metrics used in..
Cybersecurity Industry
Security Takes a Village
Scale Your Security Operation by Focusing on SOCe
An efficient security operation center (SOC) is at the heart of any effort to scale your security operation.
Cybersecurity Industry
Three Key Attributes for Achieving Meaning in Cybersecurity
What’s the goal of our cybersecurity program? How much security do I need? Have I done everything necessary to protect my business?
Cybersecurity Industry
Protect your supply chain from attacks like Kaseya Ransomware
Supply chain attacks exist when a 3rd party’s software or hardware used in an organization’s processes are used to attack it. Because a supply chain attack is launched from a partner or peer, it is often extremely difficult to detect as it is delivered from a trusted channel. Additionally, by..
Cybersecurity Industry
Security Takes a Village
Using Data Science and Automation to Combat Alert Fatigue
It’s no secret that midsize enterprises are struggling with the overwhelming demands of modern cybersecurity.A perfect storm of factors has combined to make the lives of people trusted with securing organizations difficult. Threats are escalating in both complexity and severity — in 2020, the..
Cybersecurity Industry
Optimal Security Alerts: Specific, Relevant, Actionable, Scalable
Part of my job as a Data Scientist at ActZero is to create smart high-fidelity detections, with fancy machine learning or with straightforward analytic rules. When these detections trigger, they usually send off an alert to one of our threat hunters, or directly to a customer’s IT point person. So..
Cybersecurity Industry
Virtual Roundtable: Cybersecurity Essentials for the New Normal
The digital landscape drastically changed as organizations moved workers from inside their corporate networks to their homes and into the cloud. Unfortunately, malicious actors quickly learned to take advantage of the new environments, and cybersecurity incidents increased dramatically. And, it’s..
Cybersecurity Industry
How Data Science Can Save You From a Heuristics Headache
With the over-hype of AI, it’s tough to blame people for thinking that they might be able to achieve a similar outcome using rules or basic statistics (the folks you should really blame are the marketing people!) … That being said, in this blog post I’m going to explain why these simple heuristics..
Cybersecurity Industry
Why Securing Against IT Supply Chain Attacks is Crucial
Recent high profile attacks have compromised the IT supply chain; targeting ubiquitous pieces of software to attack companies using said software. This creates a widespread opportunity for hackers, between the exploit’s creation, detection and remediation (patching) of such IT supply chain..
Cybersecurity Industry
Why the Microsoft Cloud is So Hard to Secure
As the reality of remote work spurs more organizations to make the transition to the cloud, Microsoft’s solutions are an increasingly popular choice. The company reached a 20 percent share of the worldwide cloud market for the first time in 2020, with 63 percent of businesses — and 95 percent of..
Security Hygiene
Virtual CISO
Cybersecurity Industry
Configuring for Security: 4 Free and Simple Steps
IT managers are the design architects of information and security networks. When furnished with the required resources and an expert team, they maintain daily operational stability. However, threat actors have advanced through the years, and become skilled at deploying long cycle attacks, one of..
Cybersecurity Industry
Threat Intelligence
Early Detection of Exchange Zero Day? Hindsight Indicators
In hindsight, it should have been easy to find the needle in the haystack of haystacks...
Cybersecurity Industry
Threat Intelligence
Managed Detection and Response
Data Protection
Zero Ransom Initiative
Our goal as a company is to get our customers to zero... zero breaches, zero threats, zero vulnerabilities, zero inadequate cybersecurity controls. We’ve committed to achieve this by continually investing to outpace the adversary across our technology, people and processes. Today, I’m excited to..
Cybersecurity Industry
Regulatory Compliance
How CMMC Helps with Multiple Compliance Certifications
The Cybersecurity Maturity Model Certification (cmmc 2.0) cmmc 2.0 is a ‘gold standard’ for developing the maturity of your cybersecurity. And because cmmc 2.0 requirements serve as that gold standard, cmmc 2.0 can also guide your compliance efforts across other frameworks, ensuring maximum..