Category: Cybersecurity

Browse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.

February 25, 2022

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 1

Elizabeth Fichtner

Part one of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization.

Read Now
Datto SIRIS Ransomware Detection Screenshot
February 24, 2022

Recent Increase in Wiper Malware Attacks – MSPs Heed Warnings

Ryan Weeks

In the wake of recent international events, the world is facing elevated threats of cybersecurity breaches.

Read Now

Using Sender Policy Framework to Mitigate Spoofing

Tulsie Narine

What is Sender Policy Framework (SPF) and how exactly does the protocol work?

Read Now

Log4J Exploit Detection (CVE-2021-44228)

Elizabeth Fichtner

CVE-2021-44228 – how to easily detect if your web server has been exploited and infected.

Read Now
February 23, 2022

The Most Common Cloud Security Threats and How to Avoid Them

Elizabeth Fichtner

Security threats and other risks of cloud computing still exist, and companies should take steps to avoid (or at least mitigate) them.

Read Now
February 22, 2022

Cybersecurity 101: What You Need To Know About False Positives and False Negatives

Elizabeth Fichtner

Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security.

Read Now
February 21, 2022

5 Amazing Applications of Deep Learning in Cybersecurity

Elizabeth Fichtner

Deep Learning (DL), an AI methodology, is propelling the high-tech industry to the future with a seemingly endless list of applications.

Read Now
February 18, 2022

What is a Cyber Security Compromise Assessment?

Elizabeth Fichtner

A compromise assessment is focused on looking at the current state of the health of your ecosystem and is a critical point in defining the treatment of found threats.

Read Now
February 17, 2022

A Practical Guide to Building a Cyber Incident Response Team

Elizabeth Fichtner

An effective CIRST can help respond quickly to security incidents, mitigating the damage caused to the organization.

Read Now