Security Intelligence
Featured
Announcing Field Effect MDR Core - a new cybersecurity offering inspired by MSPs, tailored for the small businesses they serve
MDR Core is ideal for MSPs supporting customers with less than 50 users and less IT complexity.
Blog Post
Announcing Field Effect MDR Core - a new cybersecurity offering inspired by MSPs, tailored for the small businesses they serve
MDR Core is ideal for MSPs supporting customers with less than 50 users and less IT complexity.
Blog Post
How to identify cybersecurity vulnerabilities
Learn key methods for identifying cybersecurity vulnerabilities within your organization to reduce your threat surface...
Blog Post
The rise of cybercrime-as-a-service
Learn about the cybercrime-as-a-service model, its impact on the threat landscape, and the most common services vendors...
Blog Post
Cyber risk management: What it is and why it's important
Learn what risk management is, how it applies to your cybersecurity, and how to get started on effectively managing...
Blog Post
Malware vs. ransomware vs. APTs: what's the difference?
Malware, ransomware, and APTs are often grouped together due to several key factors, but are distinct cyber threats to...
Blog Post
Assessing your cyber security stack: A guide for MSPs
The cyber security vendor market space has grown significantly. As an MSP, you’re likely inundated with calls about the...
Blog Post
Why an EDR solution is not enough
Understand why endpoint detection and response (EDR) solutions are insufficient to secure businesses against...
Blog Post
What is incident response preparedness?
Learn what incident response (IR) preparedness really means, why it's important and the benefits, and how to improve...
Blog Post
HIPAA & what it means for MSPs
Learn more about HIPAA, who it applies to, and how MSPs can simplify their compliance with the framework to better...
Blog Post
The real cost of a data breach in 2024
Discover how much a data breach really costs this year, plus proactive steps you can take to reduce the damage caused...
Blog Post
The Brass Tacks of Windows Kernel Access
Matt Holland explains why pulling security vendors out of the Windows kernel is a rational but surface-level reaction...
Blog Post
Threat hunting 101: An essential part of your cyber defence
Learn all about threat hunting, a critical component of any cybersecurity strategy, from why it’s important to how to...