Microsoft 365 (M365), formerly called Office 365 (O365), is Microsoft's cloud strategy flagship product with major changes ahead, such as the deprecation of their legacy authentication protocols. Often stored on or saved to the device, Basic Authentication protocols rely on sending usernames and passwords with every request, increasing the risk of attackers capturing users' … [Read more...] about A Guide to Shift Away from Legacy Authentication Protocols in Microsoft 365
guide
Download the Essential Guide to Response Automation
In the classic children's movie 'The Princess Bride,' one of the characters utters the phrase, "You keep using that word. I do not think it means what you think it means." It's freely used as a response to someone's misuse or misunderstanding of a word or phrase. "Response Automation" is another one of those phrases that have different meanings to different people. It's … [Read more...] about Download the Essential Guide to Response Automation
A Practical Guide for Startups
A common misconception among startup founders is that cybercriminals won't waste time on them, because they're not big or well known enough yet. But just because you are small doesn't mean you're not in the firing line. The size of a startup does not exempt it from cyber-attacks – that's because hackers constantly scan the internet looking for flaws that they can exploit; one … [Read more...] about A Practical Guide for Startups
A Guide to Weathering the Upcoming Vendor Positioning Storm
April is usually a whirlwind month for the cybersecurity industry as it coincides with the release of the highly regarded and influential MITRE ATT&CK test results. The ATT&CK test measures cybersecurity platforms' abilities to detect and react to emulated, multistep attacks that can be used as a barometer of platform effectiveness. This means that every cybersecurity … [Read more...] about A Guide to Weathering the Upcoming Vendor Positioning Storm
Decided to move on from your NGAV/EDR? A Guide for Small Security Teams to What’s Next
You're fully aware of the need to stop threats at the front door and then hunt any that got through that first gate, so your company installed an EPP/ EDR solution. But like most companies, you've already come across its shortcoming – and these are amplified since you have a small security team. More than likely, you noticed that it has its share of detection blind spots and … [Read more...] about Decided to move on from your NGAV/EDR? A Guide for Small Security Teams to What’s Next
A Handy Guide for Choosing a Managed Detection & Response (MDR) Service
Every company needs help with cybersecurity. No CISO ever said, "I have everything I need and am fully confident that our organization is fully protected against breaches." This is especially true for small and mid-sized enterprises that don't have the luxury of enormous cybersecurity budgets and a deep bench of cybersecurity experts. To address this issue, especially for small … [Read more...] about A Handy Guide for Choosing a Managed Detection & Response (MDR) Service
The Next Level of Prevention, Detection and Response [New Guide]
One new security technology we keep hearing about is Extended Detection and Response (XDR).This new technology merges multiple prevention and detection technologies on a single platform to better understand threat signals so that you don't need to purchase, integrate, and manage various control and integration technologies. Think of XDR as prepackaged EDR, NTA, UEBA (and … [Read more...] about The Next Level of Prevention, Detection and Response [New Guide]
Cisco named a representative vendor in the Gartner Market Guide for NDR
Gartner has published their 2020 Market Guide for Network Detection and Response (NDR) where Cisco has been named a representative vendor. NDR is even more relevant today with the growing network complexity and the evolving attacks. Despite investing a lot in security tools, the reality is that threats are able to get through. So how do you know that your digital enterprise is … [Read more...] about Cisco named a representative vendor in the Gartner Market Guide for NDR
The Comprehensive Compliance Guide (Get Assessment Templates)
Complying with cyber regulations forms a significant portion of the CISO's responsibility. Compliance is, in fact, one of the major drivers in the purchase and implementation of new security products.But regulations come in multiple different colors and shapes – some are tailored to a specific vertical, while others are industry-agnostic. Some bare explicit consequences for … [Read more...] about The Comprehensive Compliance Guide (Get Assessment Templates)
Findings from Gartner’s Market Guide for Email Security 2019
Gartner’s Market Guide for Email Security 2019 reaffirms that an increasing number of organizations are migrating their email platforms to the cloud. According to Gartner, “by 2021, Gartner expects 70% of public and private companies to be using cloud email services.”1 But, that access to email from anywhere and on any device means it is essential that organizations protect … [Read more...] about Findings from Gartner’s Market Guide for Email Security 2019