Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Blog, Learning Center
The Essential Guide to SMB Port Configuration for Enhanced Network Security
Master SMB port configuration for network security with our guide. Learn to protect against cyber threats and enhance operational safety efficiently
More DetailsTech Center -
Blog, Learning Center
Port 445: Understanding Its Role in Cyber Attacks and Strategies for Defense
Explore how to secure Port 445 against cyber threats. This guide covers the role of Port 445 in cyber attacks and outlines defense strategies to protect your network.
More DetailsTech Center -
Learning Center
Enhancing Your Cyber Defense: A Comprehensive Comparison of IDS vs IPS Technologies
February 23, 2024Businesses and individuals alike must employ robust security measures to protect their sensitive data and networks. Two key technologies in the realm of cybersecurity are Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). While both are crucial components of a comprehensive security strategy, understanding their differences is key for effective implementation and a robust cybersecurity posture. Here, we'll delve into the intricacies of IDS and IPS technologies, comparing their features, functionalities, and applications.
More DetailsTech Center -
Learning Center
Integrating Defender for Identity Into Your Security Strategy: A Step-by-Step Guide
February 23, 2024In this step-by-step guide, we'll walk you through the process of incorporating Defender for Identity into your cybersecurity program, empowering you to enhance your organization's security posture and defend against unauthorized access.
More DetailsTech Center -
Webinar
Breaches Beyond Borders: A Deep Dive Into Third-Party Cybersecurity Breaches
March 12, 2024More DetailsSupply Chain Cyber Risk -
Blog, Learning Center
Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk
February 22, 2024Ask these ten key questions to make sure your organization’s vendor questionnaire doesn't become just a “check-the-box” exercise.
More DetailsSupply Chain Cyber Risk, Tech Center -
Blog
Beating LockBit at its Own Game: Law enforcement’s takedown of a prolific ransomware group
February 22, 2024After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit
More DetailsRob Ames, Senior Staff Threat Researcher; James Niven, Senior Staff Threat Researcher
Cyber Threat Intelligence -
Blog
3 2 1… Impact! Early Results under the SEC’s Cybersecurity Governance Rule
February 22, 2024The early results under the SEC's cybersecurity governance rule are in: companies need better preparedness and processes for compliance.
More DetailsOwen Denby, General Counsel, SecurityScorecard & Justin Daniels, Shareholder, Baker Donelson
Public Sector, Services -
Blog
Chinese Hacking Group Targets US Critical Infrastructure
February 20, 2024The FBI and CISA are warning that “Volt Typhoon” has been lurking in US critical infrastructure systems for at least five years.
More DetailsCyber Threat Intelligence -
Blog, Learning Center
Unveiling the Shadows: The Rise of Volt Typhoon and the New Age of Cyber Threats
Explore the rise of Volt Typhoon and the evolving threat of Chinese hacking groups, highlighting the shift in cyber threats and the defensive strategies shaping the future of cybersecurity
More DetailsCyber Threat Intelligence -
Learning Center
The Human Factor in Cybersecurity
February 16, 2024While technological advancements continue to fortify digital defenses, human behavior remains a pivotal element in determining the success or failure of cybersecurity measures.
More DetailsTech Center -
Learning Center
What Exactly is the Dark Web?
February 16, 2024At its core, the dark web is a part of the internet that is not indexed by traditional search engines like Google.
More DetailsTech Center