Dec 06, 2023
Datto Workplace’s significant versioning minimizes data loss risks & enables the recovery of crucial versions in cases of accidental or intentional modifications.
Mar 03, 2022
With a robust defense and response plan for Conti ransomware, you can ensure users, clients, and your organization are protected against Conti and other ransomware attacks.
The top MITRE ATT&CK™ behaviors to monitor for on your endpoints and servers.
Mar 02, 2022
A compromise or threat assessment differs from intrusion detection in that it is an independent, evidence based assessment reporting your vulnerabilities, suspicious behaviors, possible exploits and indicators of a successful compromise.
Mar 01, 2022
How to deal with DarkSide - a group that packages and provides ransomware capabilities as a service
Feb 28, 2022
Part two of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization.
Feb 25, 2022
Part one of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization.
Feb 24, 2022
In the wake of recent international events, the world is facing elevated threats of cybersecurity breaches.
What is Sender Policy Framework (SPF) and how exactly does the protocol work?
CVE-2021-44228 - how to easily detect if your web server has been exploited and infected.
Feb 23, 2022
Security threats and other risks of cloud computing still exist, and companies should take steps to avoid (or at least mitigate) them.
Feb 22, 2022
Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security.
Feb 21, 2022
Deep Learning (DL), an AI methodology, is propelling the high-tech industry to the future with a seemingly endless list of applications.