ActZero Technical Overview
Cover more ground with ActZero MDR. Learn more here.
Incident Response Guide
Read our incident response guide, a step-by-step guide for IT teams and CISOs tasked with responding to security breaches or other incidents.
Incident Response Foundations Templates & Checklists
These practical templates include ways to document your detections, responses, the criteria for them, the people responsible, and pre-approval of the steps - all to avoid wasting time when it matters most: during the incident.
Cybersecurity Vendor Evaluation Package
Evaluate cybersecurity services objectively, quickly and easily with this package. Specific probing questions, a rubric to assess, record and score answers, and other resources to aid your decision.
Threat Insight: Why Businesses Need An Acceptable Use Policy
There are many reasons why your company needs an AUP, and why the document needs to play a bigger role in corporate governance. Check out this Threat Insight piece for details.
Threat Insight: Signature-Based Antivirus Bypass Threats
In reality, while AV products are certainly a must-have in your security solutions suite, they do not provide 100% protection against threats.
Threat Insight: Remote Monitoring and Management (RMM)
For information on how attacks on RMMs work and how to mitigate this cyber risk, read our Threat Insight piece.
Threat Insight: PowerShell Suspicious Scripting
Easing system administration tasks, while expanding the attack surface for cybercriminals: Get the benefits, without the headaches.
Threat Insight: Multi-factor Authentication
Businesses are frequently turning to multi-factor authentication (MFA) for its added protection over traditional authentication methods. What type of MFA do you need? Read here for insights.