Resources

On-Demand Webinar

How a $0 DFIR Kit Can Take On Big Dollar Enterprise Tools

Watch this webcast to learn about top Digital Forensic & Incident Response tools, gain insights into effective data collection and analysis, and hear success stories from the IR trenches
Blog

Friday Five: Data-Stealing Malware, Ransomware Groups Casting a Wide Net, & More

Ransomware groups continue to target organizations across multiple industries. Meanwhile, government entities are urged to be vigilant of data-stealing malware, law enforcement continues to punch back against cybercrime groups, and more. Get up to speed in this week's Friday Five.SOCIALLY SAVVY SCATTERED SPIDER TRAPS CLOUD ADMINS IN WEB BY ELIZABETH MONTALBANOThe ransomware group Scattered Spider...
On-Demand Webinar

CMMC 2.0 and the CUI Standard - What Is It and Is There an Easy Button?

According to the Department of Defense, over 200,000 aerospace and defense suppliers are expected to need to meet Cybersecurity Maturity Model Certification (CMMC) compliance. Around 76,000 of those businesses will need a CMMC level 2 certification. For Defense Industrial Base (DIB) contractors, a key part of CMMC compliance is tied to securing controlled unclassified information, or CUI. Being...
Blog

An Overview of Endpoint Detection and Response (EDR)

EDR, or endpoint detection and response, is a cybersecurity technology that monitors and collects data from endpoints to detect, analyze, investigate, and respond to cybersecurity threats. Learn more about EDR and how it can help organizations in this blog.