EDR9 Tips for Better Endpoint SecuritySponsored by HuntressJuly 26, 2024IT teams must now protect more endpoints and a wider variety of endpoints. But where do you start? Huntress has the answers.
Threat ManagementHuntress Cyber Threat Report: Hackers Hiding in Plain SightSponsored by HuntressJuly 17, 2024Hackers are weaponizing legitimate tools to pull their "disappearing act." Huntress explains.
ContentDo You Have a Security Hygiene Checklist in Place?Sponsored by HuntressDecember 13, 2022Without a strong security foundation in place, your customers will suffer from downtime and revenue loss, Huntress writes.
ContentWhat Is Threat Hunting? A Definition for MSPs and Channel PartnersSponsored by HuntressNovember 9, 2022Huntress explains four types of hunts: intelligence-driven, data-driven, knowledge-driven & hybrid hunts. Here are details for MSPs.
ContentPractical Tips for Conducting Digital Forensics InvestigationsSponsored by HuntressOctober 4, 2022Here's how MSPs, MSSPs & security analysts can fast-track digital forensics investigations & save time, according to Huntress.
ContentDon’t Get Schooled: How MSPs and Security Teams Can Catch a PhishSponsored by HuntressSeptember 14, 2022Phishing is one of the top four key paths for threat actors to achieve success in their attacks and one of the top five sources of breaches.
ContentFour Sneaky Attacker Evasion Techniques You Should Know AboutSponsored by HuntressAugust 4, 2022Hackers have learned to be quiet when infiltrating an environment. Huntress explains what MSPs & MSSPs need to know about defense evasion.
ContentNavigating the NIST Cybersecurity FrameworkSponsored by HuntressJuly 6, 2022The NIST cybersecurity framework has five pillars -- Identify, Protect, Detect, Respond and Recover -- for cybersecurity best practices.
ContentWhat Is Defense Evasion?Sponsored by HuntressJune 10, 2022By understanding defense evasion techniques, MSSPs & MSPs can harden their arsenal of traps & detections against hackers & adversaries, Huntress asserts.
ContentOne Year Later: Lessons Learned from the Colonial Pipeline CyberattackSponsored by HuntressMay 11, 2022Huntress explains what caused the Colonial Pipeline ransomware attack, and how MSPs can prevent similar cyberattacks.