Security Intelligence
Featured
The Brass Tacks of AI and Cybersecurity - Part 2 of 3 - Endpoint Agents
Field Effect CEO and Founder, Matthew Holland, explores why AI is a powerful automation tool, but not a cybersecurity panacea for endpoint agents.
Blog Post
Forge your own path: Empower your future in a culture of opportunity
Discover how Field Effect's culture encourages employees to forge their own professional path with learning,...
Blog Post
Field Effect MDR tops the 2024 MDR Data Quadrant
Field Effect MDR solution has achieved top marks in the latest 2024 Data Quadrant Report, placing us ahead of the...
Blog Post
Minimize cybersecurity risk with Field Effect MDR
Discover how Field Effect MDR not only identifies and responds to active attacks, but helps you prevent them by...
Blog Post
The Brass Tacks of AI and Cybersecurity - Part 2 of 3 - Endpoint Agents
Field Effect CEO and Founder, Matthew Holland, explores why AI is a powerful automation tool, but not a cybersecurity...
Blog Post
Ask the experts: Frequently asked cybersecurity questions, answered
Field Effect CEO Matt Holland shares top cybersecurity tips for protecting critical infrastructure. Discover best...
Blog Post
What is the dark web?
Explore the dark web, including its evolution, the types of cyberattacks and services offered, and the key players...
Blog Post
Announcing Field Effect MDR Core - a new cybersecurity offering inspired by MSPs, tailored for the small businesses they serve
MDR Core is ideal for MSPs supporting customers with less than 50 users and less IT complexity.
Blog Post
How to identify cybersecurity vulnerabilities
Learn key methods for identifying cybersecurity vulnerabilities within your organization to reduce your threat surface...
Blog Post
The rise of cybercrime-as-a-service
Learn about the cybercrime-as-a-service model, its impact on the threat landscape, and the most common services vendors...
Blog Post
Cyber risk management: What it is and why it's important
Learn what risk management is, how it applies to your cybersecurity, and how to get started on effectively managing...
Blog Post
Malware vs. ransomware vs. APTs: what's the difference?
Malware, ransomware, and APTs are often grouped together due to several key factors, but are distinct cyber threats to...
Blog Post
Assessing your cyber security stack: A guide for MSPs
The cyber security vendor market space has grown significantly. As an MSP, you’re likely inundated with calls about the...