USB Ninja With Kevin Mitnick | How You Can Be Hacked Using a USB Cable

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In April, the team discussed threat intelligence, vulnerabilities and trends, security operations center (SOC) engineering ...

Pondurance Announces Partnership With E&I Cooperative Services

The vast majority of cyberattacks are executed for financial gain, and that means that any organization, regardless of size, industry, or current in-house capabilities, can become a victim of cybercrime. Educational organizations ...
Optimizing MDR in Risk-Based Cybersecurity

CEO Discusses MDR Service With a Risk-Based Approach

Every organization has its own combination of cyber risks, including endpoints, internet-connected devices, apps, employees, third-party vendors, and more. Year after year, the risks continue to grow more complex and new threats ...

MDR Can Make an Impact on Cyber Insurance

Over the past few years, cyberattacks have increased in number and complexity, and the cost to recover from an incident has increased as well. The average cost for a company to recover ...
detection, campaigns, threat, HEAT, managed detection and response, Apache ActiveMQ, vulnerability, Aqua Cham, threat, elGang APT Meltdown Spectre Threat Detection

How Systems Integrators Can Integrate MDR Successfully

Integrating MDR into client offerings allows systems integrators to provide greater value while staying focused on their core strengths ...
Security Boulevard
Managed Detection and Response (MDR): Concept, Benefits and Use Cases

Managed Detection and Response (MDR): Concept, Benefits and Use Cases

A complex and diverse IT environment fosters innovation and growth but also considerably expands an organization’s attack surface, attracting cybercriminals.Read More The post Managed Detection and Response (MDR): Concept, Benefits and Use ...
security, multicloud, encryption, keys, sysdig, access, cloud security, Wiz, assets, security, multi-cloud, strategies, security, AWS, Amazon, cloud, cloud environment, data privacy, data protection, cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Qualys Adds Risk Assessment to Cloud Security Platform

Qualys, Inc. today updated its vulnerability management, detection and response (VMDR) cloud service to include a risk assessment capability, called TruRisk, that enables cybersecurity teams to better prioritize their remediation efforts. As ...
Security Boulevard

Under the Hood of an MDR Company: an Exercise in Innovation [Video]

Running a successful EDR platform and MDR service is never-ending pursuit to stay one step ahead of hackers. As threat actors find creative ways to attempt to circumvent our customers defenses, we ...
Log4J/Log4Shells Exploit Analysis (CVE-2021-44228)

Log4J/Log4Shells Exploit Analysis (CVE-2021-44228)

As a follow up to our other blog post related to CVE-2021-44228, the Remote Code Execution (RCE) vulnerability affecting Apache Log4j, we wanted to go into analysis of a log4shells attack. Who ...

EDR vs. MDR Services: Which is Right for You?

Cybersecurity is a topic that keeps many business executives, managers, and IT directors up at night, and with good reason. The average cost of a breach in 2021 is estimated at $4.24 ...