<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog

Cloud Security: Equip Your Organization Against Cloud-Based Threats

Until early 2020, the oft-heard pushback from legacy security practitioners was that cloud computing could never be as secure as on-premise operations. With the COVID-19 pandemic dramatically and rapidly expanding work-from-home demands, many "cloud naysayers" were forced to adopt at least some elements of the cloud.

Posted on April 29, 2021

SolarWinds Breach Updates | Ascend Technologies

As news of the SolarWinds Orion security breach continues to develop, the Ascend Technologies security team is closely monitoring updates and evaluating the impact on organizations like yours. This feed will be updated frequently with breaking news and expert insights directly from our Security Operations Centers (SOCs).

Posted on December 13, 2020

Easy Cybersecurity Steps That Make a Big Impact

What cybersecurity protections do you need for your business?

Unfortunately, as the cyber risks to small and mid-sized organizations increase, it seems as though the expert recommendations are that you need all the cybersecurity protections you can get. While this is true in a sense, that doesn’t mean it has to be all or nothing.

Posted on June 03, 2020

Ultimate Cybersecurity Glossary: Basic Terms & Buzzwords Explained

Cybersecurity is complex — the vocabulary alone can be a barrier to many non-technical users just trying to understand what cybersecurity is and what it involves.

Posted on May 12, 2020

Every Second Counts: 7 Steps to Take After a Cyberattack

Seconds matter when you’re detecting threats, and they’re even more vital when a threat becomes a successful cyberattack.

Posted on February 06, 2020

Cyber Defense Roster: Your key players in the fight against cyberattacks

Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.

Posted on November 12, 2019

Ransomware: How cyber attackers turn hacking into profit

Learn about the growing cyber threat that attackers use to make money… by taking yours.

Posted on November 05, 2019

Hidden Threats: Preventing cyberattacks with a layered security approach

Advanced attacks are out there.

Advanced malware threats are hiding in software applications many of us use daily and trust.  So much so that legitimate software can be difficult to distinguish.  New attack vectors are continuously being discovered and attackers are finding back doors onto your device to gather you or your company’s information.

Posted on August 28, 2019

Infogressive EDR dominates MITRE ATT&CK Product Evaluations: What it Means for You

What is the MITRE ATT&CK Product Evaluation?

The ATT&CK evaluation framework, according to MITRE, is a new development that provides a transparent, customer-centric approach to product evaluation for cyber detection software and solutions.

The ATT&CK evaluation framework is intended to help the different stakeholders in Detection & Response (“defenders and vendors”) work together to improve...

Posted on July 02, 2019

MSSPs: The Ultimate Guide to Making the Right Choice

Finding the right people to fill cybersecurity positions in your organization is getting harder and harder.

In 2018, according to the Information Systems Audit and Control Association (ISACA), three in five organizations have unfilled cybersecurity or IT security positions, with 54% of companies saying it took over three months to fill those positions.

Posted on June 03, 2019

Combining the Power of NGAV and EDR

Traditional antivirus simply isn’t enough to fight the advanced, targeted attacks being deployed today.

How do you fight back? What solutions do you need to prevent the dramatic loss that can rampage through your company?

It’s time to fight back with the next generation of antivirus technology.

 

Posted on April 09, 2019

Continuous Monitoring: Proactive Security

What’s your plan if an attack makes it past your defenses?

While there are many tools and technologies that fight to keep attackers out, it’s just as important to have a plan if those fail.

Posted on April 02, 2019

The Five Stages of Vulnerability Management

What sounds better? Proactively fighting potential threats or scrambling to pick up the pieces after an attacker has successfully made their way onto your system?

As threats continue to become more complex and targeted, it’s more important than ever to focus your efforts to minimize the risk before it’s too late. Vulnerability management is one way to do that.

 

Posted on March 26, 2019

Lateral Movement: Legitimate Activity or Real Threat

A good disguise can go a long way.

Concealing your real identity and priorities can get you far, especially in cybersecurity. 

When an attacker is disguised as a legitimate user, it’s harder to detect their presence, often until it’s too late. This is most evident during the cyberattack stage of lateral movement. To fight an attack at this stage, it’s important to know the objectives of...

Posted on March 19, 2019

Fileless Malware: How to Protect Against This Rising Attacker Trend

The threat landscape is changing.

Fileless malware is a phrase that is rapidly picking up popularity in the cybersecurity industry. In fact, 77% of successful cyberattacks in 2017 utilized some form of fileless malware. So you’ve probably heard of it, and you know you should be scared of it… but what is fileless malware?

 

Posted on March 12, 2019

TOP ARTICLES:

QUESTIONS?