Secdo Blog

Threat Hunting Series: Endpoint Visibility

Worse than looking for a needle in a haystack is having to do so in the dark without your glasses. In our second installment of the series, we look at the role of endpoint visibility in threat...

Read more...

Threat Hunting Series

In this new series, we discuss certain major factors that make threat hunting effective. In this first installment, we describe the subject and its purpose.

Read more...

Inflicting a Pyramid of Pain on Hackers with Behavioral Indicators of Compromise

If you’ve been working for any time in cybersecurity, you probably have encountered the concept of the Pyramid of Pain, first posed by security architect, David Bianco, in a blog post in 2014. It...

Read more...

What are cyber attackers after…after all?

Security teams have spent the better part of the last decade deploying the best network security solutions which have proven to be, for the most part, reliable. We then make sure these...

Read more...

Helping MSSPs Reduce Risks with Adaptive Threat Management

Customers put a lot of trust in an MSSP – trust that you can provide with the service(s) that you are offering. If you can’t, you AND your customers suffer. The consequences are typically costly...

Read more...

Wanted: A Continuous, Adaptive Response to Security

Seasoned security professionals know that there is no silver bullet for cybersecurity. Attackers WILL get into your environment - it’s inevitable, it’s most likely already happened. Worse yet, the...

Read more...

4 Things Every MSSP Should Know Before Adding a New Tool to Its Security Stack

MSSPs, MDRs and all kinds of managed services providers who focus on security have a different kind of DNA. They’re risk-takers—literally. And taking on the liability of your clients’ security...

Read more...

Under Siege: How SMB Banks and Credit Unions Can Scale to Fight Large Cyberattacks

All banks share the same key responsibility—to manage and protect the financial assets of its customers. No matter if they are the neighborhood bank, or the size of JPMorgan Chase, this key...

Read more...

Is EDR picking up SIEM’s slack?

Most organizations rely on SIEM tools to monitor network events and manage security incidents. According to a study by Technavio, the SIEM market is expected to grow about 12% globally over the...

Read more...

Summer Is the Top Season for Cyber Attacks. Here is Why.

Summer is the ideal time for taking a well-deserved break. Unless you are in charge of your company’s cybersecurity.  

Read more...

Connect with us

Stay connected

whitepaper banner-280X233.png