Insights

Articles & Resources

Subscribe to Receive Updates

Connect

Technical Expertise

MDR Vs. XDR: Determining the Right Solution for Your Business

August 24, 2023

MDR and XDR are often mischaracterized as competing solutions. In reality, XDR is a useful solution that can be utilized by MDR providers. Deciding what’s best for you comes down to whether you plan to manage cybersecurity in-house or outsource to a dedicated MDR provider.

Read Now
Technical Expertise

Cybersecurity Trends 2023

February 13, 2023

To defend against evolving threats, organizations should ensure their cybersecurity posture is informed by industry trends, such as zero trust, password-less authentication, SOCaaS, and more.

Read Now
Technical Expertise

Cybersecurity Best Practices

January 26, 2023

As remote work, ongoing warfare, and other societal stressors heighten cyber vulnerabilities and attacks, it is crucial to implement cybersecurity best practices such as maintaining password hygiene, zero trust, and cloud backups, among others.

Read Now
Technical Expertise

Expert Interview: MFA, Continuous Monitoring, And Cybersecurity Trends in 2022 With James Ewing

October 24, 2022

In light of an uptick in cyberattacks, we sat down with Cybersafe Security Sales Engineer James Ewing to discuss the prevalence of cybercrimes in periods of crisis and the importance of measures like multi-factor authentication and continuous monitoring. Disclaimer: Questions and answers have been edited for clarity.

Read Now
In the News Technical Expertise

What Can Your Company Learn From the Uber Hack?

September 29, 2022

Following a cyberattack on rideshare service Uber, Cybersafe Solutions Chief Information Security Officer Thomas Pioreck discusses lessons learned and expert tips on multi-factor authentication, password protection, and empowering employee incident response.

Read Now
Technical Expertise

The Importance of Multifactor Authentication

September 01, 2022

Multifactor authentication (MFA) involves a two-factor verification of your personal information, making it more challenging for hackers to infiltrate your account and steal sensitive data.

Read Now
Technical Expertise

Visibility Into Endpoint Activity: Endpoint Detection & Response

July 19, 2022

Endpoint Detection and Response (EDR) services continuously monitor desktops, laptops, and mobile devices for suspicious activity, preventing, detecting, and responding to threats before they manifest as attacks.

Read Now
Technical Expertise

Essential Tools for Cyber Underwriting

June 14, 2022

During the cyber underwriting process, insurers determine appropriate policy coverage by utilizing tools such as non-invasive scanning, continuous monitoring assessments, breach history reporting, compliance verification, benchmarking, and cyber risk quantification.

Read Now
Technical Expertise

What Can Cyber Insurance Cover?

May 19, 2022

Cyber insurance is a supplemental security measure, helping reduce the damaging effects of a breach and covering claims such as data damage, extortion, and liability.

Read Now