Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for August
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In August, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for June 2024
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In June, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting, security operations ...
CrowdStrike Update Created Widespread Outage
As a recap, a widespread Microsoft Windows outage began on July 19 and expanded throughout the day due to a CrowdStrike content update for Microsoft Windows hosts. Pondurance and its systems were ...

Assessing Third-Party Risk in the Healthcare Sector
Many organizations rely on third parties, including vendors, partners, suppliers, and contractors, to keep their operations up and running. Often, third parties are granted access to an organization’s critical systems, networks, and ...

Recover Using a Risk-Based Approach
Identify, protect, detect, respond, and recover are the five categories that the National Institute of Standards and Technology (NIST) uses in its NIST Cybersecurity Framework. This guideline can help organizations assess and ...
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for May 2024
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In May, the team discussed threat intelligence, vulnerabilities and trends, threat hunting, and the product ...

Protect, Detect, and Respond Using a Risk-Based Approach
The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides guidelines for organizations to use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover. Pondurance, a ...

Identify Your Cybersecurity Risk Using a Risk-Based Approach
The National Institute of Standards and Technology (NIST) has laid out the Cybersecurity Framework as a set of guidelines that offers outcomes that organizations can use in their cybersecurity efforts. The NIST categories include ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In April, the team discussed threat intelligence, vulnerabilities and trends, security operations center (SOC) engineering ...