Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for August
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In August, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) updates, and SOC engineering insights. Threat intelligence The Senior Manager of Digital Forensics and Incident Response (DFIR) discussed ... Read More
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) updates, and SOC engineering insights. Threat intelligence The Principal Digital Forensics and Incident Response (DFIR) Consultant discussed attacker-in-the-middle ... Read More
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for June 2024
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In June, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting, security operations center (SOC) engineering insights, and deception technologies. Threat Intelligence The Assistant Vice President of Digital Forensics and Incident ... Read More
CrowdStrike Update Created Widespread Outage
As a recap, a widespread Microsoft Windows outage began on July 19 and expanded throughout the day due to a CrowdStrike content update for Microsoft Windows hosts. Pondurance and its systems were not affected by the issue, and Pondurance continued its security services delivery without incident. What happened During the ... Read More

Assessing Third-Party Risk in the Healthcare Sector
Many organizations rely on third parties, including vendors, partners, suppliers, and contractors, to keep their operations up and running. Often, third parties are granted access to an organization’s critical systems, networks, and sensitive data, putting the organization at risk of a cyberattack or data breach originating with the third party ... Read More

Recover Using a Risk-Based Approach
Identify, protect, detect, respond, and recover are the five categories that the National Institute of Standards and Technology (NIST) uses in its NIST Cybersecurity Framework. This guideline can help organizations assess and manage their cybersecurity risks. Pondurance, a managed detection and response (MDR) services provider with a 24/7 security operations ... Read More
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for May 2024
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In May, the team discussed threat intelligence, vulnerabilities and trends, threat hunting, and the product road map. Threat Intelligence The Senior Digital Forensics and Incident Response (DFIR) Consultant discussed trends from the first quarter ... Read More

Protect, Detect, and Respond Using a Risk-Based Approach
The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides guidelines for organizations to use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover. Pondurance, a managed detection and response services provider with a 24/7 security operations center (SOC), uses those same five categories ... Read More

Identify Your Cybersecurity Risk Using a Risk-Based Approach
The National Institute of Standards and Technology (NIST) has laid out the Cybersecurity Framework as a set of guidelines that offers outcomes that organizations can use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover. Pondurance, a managed detection and response services provider with a 24/7 security operations center, ... Read More

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In April, the team discussed threat intelligence, vulnerabilities and trends, security operations center (SOC) engineering insights, threat hunting, and detection engineering. Threat Intelligence The Senior Manager of Digital Forensics and Incident Response (DFIR) ... Read More