Security ManagementDon’t Get Your Security from Your RMM Provider: The Risks You Should KnowSponsored by HuntressSeptember 3, 2024Opting for security solutions through your RMM provider might seem like a cost-saving measure, but it’s often a false economy. Huntress explains.
Vulnerability ManagementHuntress is Now a CVE Numbering AuthoritySponsored by HuntressAugust 30, 2024The CVE List feeds into the U.S. National Vulnerability Database (NVD), enabling rapid discovery and correlation of vulnerability information.
EDR9 Tips for Better Endpoint SecuritySponsored by HuntressJuly 26, 2024IT teams must now protect more endpoints and a wider variety of endpoints. But where do you start? Huntress has the answers.
Threat ManagementHuntress Cyber Threat Report: Hackers Hiding in Plain SightSponsored by HuntressJuly 17, 2024Hackers are weaponizing legitimate tools to pull their "disappearing act." Huntress explains.
ContentDo You Have a Security Hygiene Checklist in Place?Sponsored by HuntressDecember 13, 2022Without a strong security foundation in place, your customers will suffer from downtime and revenue loss, Huntress writes.
ContentWhat Is Threat Hunting? A Definition for MSPs and Channel PartnersSponsored by HuntressNovember 9, 2022Huntress explains four types of hunts: intelligence-driven, data-driven, knowledge-driven & hybrid hunts. Here are details for MSPs.
ContentPractical Tips for Conducting Digital Forensics InvestigationsSponsored by HuntressOctober 4, 2022Here's how MSPs, MSSPs & security analysts can fast-track digital forensics investigations & save time, according to Huntress.
ContentDon’t Get Schooled: How MSPs and Security Teams Can Catch a PhishSponsored by HuntressSeptember 14, 2022Phishing is one of the top four key paths for threat actors to achieve success in their attacks and one of the top five sources of breaches.
ContentFour Sneaky Attacker Evasion Techniques You Should Know AboutSponsored by HuntressAugust 4, 2022Hackers have learned to be quiet when infiltrating an environment. Huntress explains what MSPs & MSSPs need to know about defense evasion.
ContentNavigating the NIST Cybersecurity FrameworkSponsored by HuntressJuly 6, 2022The NIST cybersecurity framework has five pillars -- Identify, Protect, Detect, Respond and Recover -- for cybersecurity best practices.