Maritime Cybersecurity: Don’t Let One Attack Sink Your Business
Watch the leadership of ABS Wavesight™ and ActZero™ for an open discussion on maritime cybersecurity risks, the role technology and regulations play, and how companies can better prepare for potential attacks.
How to Stay Proactive Against Potential Ransomware
Technical Account Manager, Ryan Masrani, gives three tips on how to stay proactive against potential ransomware.
How AI Decreases the Risk of Ransomware Attacks
The average SOC analyst typically has the capacity for a thorough review of 10-15 alerts per day. What if they were only required to connect the dots without manually tagging each warning? Discover more.
Fireside Chat: Healthcare Cybersecurity: Protecting Patient Information
Chief Security Officer Adam Mansour talks about a primary focus for Healthcare providers; Protecting Patient Information. He provides insight into what hackers use patient data for, how they typically get it, and much more.
CMMC 1.0 vs. CMMC 2.0: How the Change Impacts Your Organization
The Department of Defense announced significant changes to the CMMC in its Version 2.0 announcement. What exactly are these changes and how will CMMC 2.0 affect you? Watch this webinar on-demand for insights.
ActZero Technical Overview
Cover more ground with ActZero MDR. Learn more here.
Incident Response Foundations Templates & Checklists
These practical templates include ways to document your detections, responses, the criteria for them, the people responsible, and pre-approval of the steps - all to avoid wasting time when it matters most: during the incident.
Cybersecurity Vendor Evaluation Package
Evaluate cybersecurity services objectively, quickly and easily with this package. Specific probing questions, a rubric to assess, record and score answers, and other resources to aid your decision.
Threat Insight: Why Businesses Need An Acceptable Use Policy
There are many reasons why your company needs an AUP, and why the document needs to play a bigger role in corporate governance. Check out this Threat Insight piece for details.