Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for August

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In August, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) updates, and SOC engineering insights. Threat intelligence The Senior Manager of Digital Forensics and Incident Response (DFIR) discussed ... Read More

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) updates, and SOC engineering insights. Threat intelligence The Principal Digital Forensics and Incident Response (DFIR) Consultant discussed attacker-in-the-middle ... Read More

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for June 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In June, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting, security operations center (SOC) engineering insights, and deception technologies. Threat Intelligence The Assistant Vice President of Digital Forensics and Incident ... Read More

CrowdStrike Update Created Widespread Outage

As a recap, a widespread Microsoft Windows outage began on July 19 and expanded throughout the day due to a CrowdStrike content update for Microsoft Windows hosts. Pondurance and its systems were not affected by the issue, and Pondurance continued its security services delivery without incident. What happened During the ... Read More
Risk-Based Approach to Cybersecurity and Compliance

Assessing Third-Party Risk in the Healthcare Sector

| | Blog Posts, healthcare
Many organizations rely on third parties, including vendors, partners, suppliers, and contractors, to keep their operations up and running. Often, third parties are granted access to an organization’s critical systems, networks, and sensitive data, putting the organization at risk of a cyberattack or data breach originating with the third party ... Read More
Risk-Based Approach to Cybersecurity and Compliance

Recover Using a Risk-Based Approach

| | Blog Posts
Identify, protect, detect, respond, and recover are the five categories that the National Institute of Standards and Technology (NIST) uses in its NIST Cybersecurity Framework. This guideline can help organizations assess and manage their cybersecurity risks. Pondurance, a managed detection and response (MDR) services provider with a 24/7 security operations ... Read More

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for May 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In May, the team discussed threat intelligence, vulnerabilities and trends, threat hunting, and the product road map. Threat Intelligence The Senior Digital Forensics and Incident Response (DFIR) Consultant discussed trends from the first quarter ... Read More
Accelerate Your Security Posture with Risk-Driven Security Strategies

Protect, Detect, and Respond Using a Risk-Based Approach

The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides guidelines for organizations to use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover. Pondurance, a managed detection and response services provider with a 24/7 security operations center (SOC), uses those same five categories ... Read More
Accelerate Your Security Posture with Risk-Driven Security Strategies

Identify Your Cybersecurity Risk Using a Risk-Based Approach

The National Institute of Standards and Technology (NIST) has laid out the Cybersecurity Framework as a set of guidelines that offers outcomes that organizations can use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover. Pondurance, a managed detection and response services provider with a 24/7 security operations center, ... Read More
USB Ninja With Kevin Mitnick | How You Can Be Hacked Using a USB Cable

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In April, the team discussed threat intelligence, vulnerabilities and trends, security operations center (SOC) engineering insights, threat hunting, and detection engineering. Threat Intelligence The Senior Manager of Digital Forensics and Incident Response (DFIR) ... Read More