<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

Fileless Malware: How to Protect Against This Rising Attacker Trend

The threat landscape is changing.

Fileless malware is a phrase that is rapidly picking up popularity in the cybersecurity industry. In fact, 77% of successful cyberattacks in 2017 utilized some form of fileless malware. So you’ve probably heard of it, and you know you should be scared of it… but what is fileless malware?

Posted on March 12, 2019

Network Visibility: What Can't You See?

Every network has its weaknesses.

But do you know what they are and the impact they have on your network security? With the large amount of data on systems and advances in attack sophistication, it’s more important than ever to have a complete picture of what’s going on in your network.

Posted on March 05, 2019

Advanced Persistent Threat: Challenge Accepted

The battle of cybersecurity is constantly advancing.

As hackers move to more complex, focused efforts, their strategies have changed and the threat has increased.

One of these strategies, advanced persistent threats (APT), is a customized, focused attack that is difficult to detect and nearly impossible to prevent. So how do companies of all sizes protect their networks and keep their customer...

Posted on February 26, 2019

What is EDR & How Can it Protect You?

What’s your game plan if prevention fails? 

As attack techniques continue to advance, it’s crucial to have a plan in place. Last year, 77% of successful attacks used fileless attack techniques, something even the best antivirus solution can’t track or prevent.

Posted on February 19, 2019

Your Game Plan to Disrupt the Cyberattack Lifecycle

Cyberattacks don’t happen overnight.

They take weeks, even months of planning, research, and deliberate actions. At each stage, from the preparation to the finished attack, there’s great potential to detect the malicious activity and break down the entire operation.

Posted on February 12, 2019

The Complete Guide to EDR

As the intelligence of hackers continues to grow, so does the technology built to protect against even their best attacks.

Technology like Endpoint Detection & Response (EDR) can be invaluable to businesses or managed service providers (MSPs), but with such a powerful tool, there are many questions that need to be answered to understand how it works, what it protects against, and the benefits it...

Posted on February 08, 2019

A Security Engineer's Guide to EDR

Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.” After all this research, we have a team put together and have partnered with a platform we believe in, allowing us to be able to offer this service to...

Posted on October 23, 2018

5 Ways Ascend Protects Your Castle with Managed Security Services

It seems that our news feeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away, or hoping that our news filters are malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ever before. 

Posted on November 17, 2016

The Key to Successful SIEM

In response to increased compliance concerns and the need to protect against security breaches, more companies are implementing SIEM technology to more easily collect, correlate and analyze data and security alerts from a central location. But once a SIEM is in place, how can organizations be sure it remains effective over time? That’s where a detailed threat assessment comes in.

Posted on June 23, 2016

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?