Syndicated Blog

Blog | Pondurance
24×7 Managed Detection and Response (MDR)

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for August

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In August, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for June 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In June, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting, security operations ...

CrowdStrike Update Created Widespread Outage

As a recap, a widespread Microsoft Windows outage began on July 19 and expanded throughout the day due to a CrowdStrike content update for Microsoft Windows hosts. Pondurance and its systems were ...
Risk-Based Approach to Cybersecurity and Compliance

Assessing Third-Party Risk in the Healthcare Sector

| | Blog Posts, healthcare
Many organizations rely on third parties, including vendors, partners, suppliers, and contractors, to keep their operations up and running. Often, third parties are granted access to an organization’s critical systems, networks, and ...
Risk-Based Approach to Cybersecurity and Compliance

Recover Using a Risk-Based Approach

| | Blog Posts
Identify, protect, detect, respond, and recover are the five categories that the National Institute of Standards and Technology (NIST) uses in its NIST Cybersecurity Framework. This guideline can help organizations assess and ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for May 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In May, the team discussed threat intelligence, vulnerabilities and trends, threat hunting, and the product ...
Accelerate Your Security Posture with Risk-Driven Security Strategies

Protect, Detect, and Respond Using a Risk-Based Approach

The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides guidelines for organizations to use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover. Pondurance, a ...
Accelerate Your Security Posture with Risk-Driven Security Strategies

Identify Your Cybersecurity Risk Using a Risk-Based Approach

The National Institute of Standards and Technology (NIST) has laid out the Cybersecurity Framework as a set of guidelines that offers outcomes that organizations can use in their cybersecurity efforts. The NIST categories include ...
USB Ninja With Kevin Mitnick | How You Can Be Hacked Using a USB Cable

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In April, the team discussed threat intelligence, vulnerabilities and trends, security operations center (SOC) engineering ...