32 min video
The threat landscape continues to evolve. Mere protection, however diligent, is not practical to defend against threats. Adversaries are difficult to distinguish clearly from insiders. Even money says the threat is already inside from cyber criminals who have breached a fluid and growing attack surface to move stealthily across the organization. Are you still only reacting to alerts and incidents? Welcome to proactive cyber threat hunting.
What is Cobalt Strike and How Does It Work?
What is Cobalt Strike and how does it work? Cobalt strike is a weaponized software that deploys a difficult-to-detect beacon to a target. But how...
What are the Different Types of MDR Service Providers?
Managed Detection & Response (MDR) is all the rage, and countless vendors have shown up that tout brilliant, low-effort outcomes. Buyers must look...
An MSP Security Q&A Session
Offering a managed cybersecurity service to your clients is tougher than it sounds. Clients expect you to handle any new threats that come their...