Blog

What is a Virtual CISO?

What is a Virtual Chief Information Security Officer (vCISO)? In the video below, Mike details the attributes of a good Virtual CISO, and also tells you the various services that they offer. He also compares this to other cybersecurity services,

Read more ›

Managed Detection and Response Providers Comparison: Endpoint Tools

Your company is comparing Managed Detection and Response (MDR) providers for cybersecurity. But what if your company already owns some of it’s own tools, such as Microsoft Defender for Endpoint, Crowdstrike, or Carbon Black? In the video below, Mike explains

Read more ›

Cybersecurity Risk Assessment Common Findings: Access Control Management

What are the most common findings of a Cybersecurity Risk Assessment, in terms of CIS Control 6: Access Control Management? In the video below, Mike explains the two most common findings, according to his conversations with cybersecurity engineers, performing risk

Read more ›

Managed Detection and Response Providers Comparison: Pricing

How does the pricing compare, among Managed Detection and Response (MDR) providers? In the video below, Mike how much MDR costs, per endpoint, whether or not they include remediation, and several other aspects of pricing you need to understand before

Read more ›

Managed Detection and Response Providers Comparison: Recording Network Activity

Your company is evaluating your cybersecurity needs, and you’re thinking of procuring a Managed Detection and Response (MDR) solution. But there are a ton to choose from… how do you compare them? In this video, Mike explains that one of

Read more ›

Cybersecurity Risk Assessment Common Findings: Account Management

What are the most common gaps found within companies, when performing a formal cybersecurity risk assessment? In the video below, Mike explains the most common findings within CIS Control #5 – Account Management. Want Mike’s recommendations on the best vendors

Read more ›

Managed Detection and Response (MDR) Providers Comparison: Free Forensic Assessment

Your company is researching Managed Detection and Response Providers. But how do you compare the options? One way is to ask about a Free Forensic Assessment. In the video below, Mike explains what this entails and why it might need

Read more ›

Cybersecurity Risk Assessment Common Findings: Configuration of Enterprise Assets and Software

What are the most common findings of a cybersecurity risk assessment, in regards to the configuration of enterprise assets and software? In the video below, Mike explains why IoT devices and USB drives are the most common gaps found in

Read more ›

Penetration Testing Services Comparison: What should your report look like?

When you’re comparing penetration testing services for your organization, what should the final report include? In the video below, Mike gives you several things that you should consider as “must-haves” in your deliverable, from a pen testing service. Want Mike’s

Read more ›

Managed Detection and Response Providers Comparison: Zero False Positive Guarantee

When comparing Managed Detection and Response (MDR) service providers, one thing you might want to ask is if they have a “zero false positive guarantee.” In the video below, Mike explains what this is and why it’s important to your

Read more ›