7 Lessons Learned From SMB Cybersecurity Leaders

While I might not be in the IT trenches, over my years in sales I have had the benefit of working alongside IT leaders across multiple industries. I’ve learned first-hand about the ...

The Traditional SOC Is Dead, Long Live the Remote SOC

If you haven't read our 2021 Cybersecurity predictions blog and whitepaper, I recommend that you do. In it, you'll find one prediction that might be somewhat controversial—the death of the Security Operations ...

The Traditional SOC Is Dead, Long Live the Remote SOC

If you haven't read our 2021 Cybersecurity predictions blog and whitepaper, I recommend that you do. In it, you'll find one prediction that might be somewhat controversial—the death of the Security Operations ...

Discussing Cybersecurity Outcomes (Not Features) with CIOs

| | Cybersecurity Industry
As a newcomer within the cybersecurity industry, having joined ActZero/IntelliGO just over eight months ago, there have been many learning opportunities to come my way. One of the biggest lessons when selling ...

2021 Cybersecurity Predictions

| | Cybersecurity Industry
With a new year comes a new set of predictions for cybersecurity. We’ve developed these predictions to help corporate executives and IT leaders of small to medium sized organizations improve their risk ...

5 Questions for Your Managed Cybersecurity Vendor

| | Cybersecurity Industry
As we approach the end of the year, you may be doing some reflecting on your environment, stack, and vendor list. How have they been working for you in 2020? What could ...

Why Your Board Doesn’t Need A Security Expert

Would it surprise you if I said you didn’t need a dedicated cybersecurity expert on your board? ...

CYBER Rules: DOD’s DFARS and CMMC Explained

Cybersecurity expert Rob Knake informally interviews top cybersecurity lawyer Evan Wolff regarding an important change to the Cyber Maturity Model Certification (CMMC).On November 30th, the Department of Defense (DOD) Defense Federal Acquisition ...

What To Do When an Admin is Compromised

A common tactic used by hackers once they have landed within your environment, is to escalate their level of access by compromising a user with administrative privileges.  In this post, we cover ...

How to Choose an MDR Provider

Managed detection and response (MDR) providers are becoming increasingly popular with small-to-medium sized business and mid-market companies alike. Gartner estimates that by 2024, a quarter of all organizations will be using MDR services—either ...