Boom, and just like that you are compromised. The “Left of Boom” is the timeframe beforehand, the preventative approach. While much of the industry attention has been on the ability to react quickly and contain intrusions, or “Right of Boom,” it is the prioritization of detecting and responding to a threat before it compromises a system where a truly comprehensive and effective approach lies. Detecting attacks early can make a difference between facing an......
Read More
Detecting Anomalous O365 Logins and Evasion Techniques
Summary Businesses across multiple industries, regardless of size, are at risk of being targeted with Microsoft 365 phishing campaigns....
Read MoreCase Study: Vertek’s USM Anywhere MDR Helps Larger Auto Dealership in the Northeast Improve Cybersecurity Posture
Challenges A larger auto dealership in the northeast faced a number of cybersecurity challenges, including: Lack of resources: The...
Read MoreMicrosoft Defender for Cloud Apps Alerting and Behaviors
Background: On May 28th, 2023, Microsoft began moving away from using Alerts in Microsoft Defender for Cloud Apps into...
Read MoreLog4Shell Vulnerability
Summary: On Dec. 9, 2021, Proof of Concept exploitation code for the remote code execution (RCE) vulnerability (CVE-2021-44228) in...
Read MoreWhat is a SIEM and Why Does My Customer Need One?
It used to be the case that perimeter security solutions were enough to keep the good guys in and...
Read MorePRNewswire – Strategic AlienVault MSSP Partner Vertek Gains Momentum
COLCHESTER, Vt., May 9, 2017 /PRNewswire/ — Vertek, a leading Vermont-based solutions and security provider, is gaining momentum as...
Read More