ContentDo You Have a Security Hygiene Checklist in Place?Sponsored by HuntressDecember 13, 2022Without a strong security foundation in place, your customers will suffer from downtime and revenue loss, Huntress writes.
ContentWhat Is Threat Hunting? A Definition for MSPs and Channel PartnersSponsored by HuntressNovember 9, 2022Huntress explains four types of hunts: intelligence-driven, data-driven, knowledge-driven & hybrid hunts. Here are details for MSPs.
ContentPractical Tips for Conducting Digital Forensics InvestigationsSponsored by HuntressOctober 4, 2022Here's how MSPs, MSSPs & security analysts can fast-track digital forensics investigations & save time, according to Huntress.
ContentDon’t Get Schooled: How MSPs and Security Teams Can Catch a PhishSponsored by HuntressSeptember 14, 2022Phishing is one of the top four key paths for threat actors to achieve success in their attacks and one of the top five sources of breaches.
ContentFour Sneaky Attacker Evasion Techniques You Should Know AboutSponsored by HuntressAugust 4, 2022Hackers have learned to be quiet when infiltrating an environment. Huntress explains what MSPs & MSSPs need to know about defense evasion.
ContentNavigating the NIST Cybersecurity FrameworkSponsored by HuntressJuly 6, 2022The NIST cybersecurity framework has five pillars -- Identify, Protect, Detect, Respond and Recover -- for cybersecurity best practices.
ContentWhat Is Defense Evasion?Sponsored by HuntressJune 10, 2022By understanding defense evasion techniques, MSSPs & MSPs can harden their arsenal of traps & detections against hackers & adversaries, Huntress asserts.
ContentOne Year Later: Lessons Learned from the Colonial Pipeline CyberattackSponsored by HuntressMay 11, 2022Huntress explains what caused the Colonial Pipeline ransomware attack, and how MSPs can prevent similar cyberattacks.
ContentWhat Should A Modern Cybersecurity Stack Look Like?Sponsored by HuntressApril 6, 2022Huntress explains the critical layers that security-driven MSPs need to address for themselves and end-customers.
ContentTargeted APT Activity: BABYSHARK Is Out for BloodSponsored by HuntressMarch 7, 2022This blog follows the ThreatOps investigation of targeted DPRK (North Korean) backed cyber espionage efforts against Nuclear Think Tanks.