The best defense against cyber threats for lean security teams

H0lyGh0st, Magecart, and a slew of state-sponsored hacker groups are diversifying their tactics and shifting their focus to… you. That is, if you’re in charge of cybersecurity for a small-to-midsize enterprise (SME). Why? Bad actors know that SMEs typi… Continue reading The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

There is a consensus among MSPs and MSSPs that vCISO services pose an excellent opportunity for a new revenue stream, but how do you successfully do that? Watch this panel discussion to hear from MSSP leaders who already sell vCISO services as they dis… Continue reading Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

Hopefully, you’ve been working with the Center for Internet Security (CIS) on securing your cloud infrastructure for a while now. Initially, you might have used our CIS Benchmarks and other free resources to manually configure your operating systems in… Continue reading Security in the cloud with more automation

Guide: How virtual CISOs can efficiently extend their services into compliance readiness

Compliance services are emerging as one of the hottest areas of cybersecurity. While compliance used to be mainly the province of large enterprises, times have changed, and it is now a day-to-day concern for a growing number of small and medium busines… Continue reading Guide: How virtual CISOs can efficiently extend their services into compliance readiness

eBook: 4 ways to secure passwords, avoid corporate account takeover

Enterprising cybercriminals don’t have to work very hard to gain access to your network and all the valuable information stored inside it. That’s because employee accounts are so easy to hack. Once the bad actors have access, a full corporate account t… Continue reading eBook: 4 ways to secure passwords, avoid corporate account takeover