Blog

MDR Provider Comparison: Should our mid-size company buy Microsoft Defender for Endpoint?

Should our mid-size company buy Microsoft Defender for Endpoint? Mike continues his (MDR Provider Comparison) series, by addressing this question. He gives 3 questions to ask yourself about your organization, that will help determine if Defender for Endpoint is a

Read more ›

Penetration Testing Services Comparison: What is Black Box?

What is a Black Box penetration testing service, and why is it important, when comparing offerings from different vendors? In the video below, Mike Smith explains what a black box test entails, and when it might be a good fit

Read more ›

Penetration Testing Provider Comparison: What is White Box?

When comparing penetration testing providers, it’s important to know the difference between white box, gray box and black box. In the video below, Mike Smith explains white box pen testing services, and when your company should choose this type of

Read more ›

Managed Detection and Response Provider Comparison: What is MDR?

What is MDR? Before we compare Managed Detection and Response providers, it’s important to fist establish what defines an MDR provider. In the video below, Mike explains the problems MDR is built to solve, and the different services that MDR

Read more ›

The Best SASE SD-WAN Vendors: What is SASE?

What is SASE? Who are the best SASE SD-WAN vendors? In the video below, Mike Smith explains SASE (secure access service edge), and also tells you some tips on how SASE vendors differ in their product offerings. Want Mike’s recommendations

Read more ›

Penetration Testing Services Comparison: Ask the 3 Big Questions

Before you do a comparison of companies offering penetration testing services for your organization, make sure you ask the 3 big questions, first. In the video below, Mike Smith lists the 3 big questions, and why you need to ask

Read more ›

Cybersecurity Risk Assessment Steps

What steps are involved in a cybersecurity risk assessment? In the video below, Mike Smith explains his opinion on the 11 steps involved in a cybersecurity risk assessment, and the order in which they should be taken. Want Mike’s recommendations

Read more ›