Blogs

Virtual CISO Services (vCISO)
Virtual CISO Services (vCISO)
Virtual security advisory to build out your strategic security framework.
Our team of former CISOs can provide the technical and executive leadership your organization needs to build and maintain a comprehensive strategy to defeat threats and keep pace with the latest attack profiles.

IDC Survey Points to Value of MDR in Helping Companies Resolve Security Alerts
Companies of all sizes are failing to investigate an alarming number of security alerts – as many as one-third – and are spending about as long investigating false positives as they do actionable alerts.

In Cybersecurity Every Alert Matters | IDC White Paper
In Cybersecurity Every Alert Matters
A cybersecurity practitioner has one of the hardest jobs to tackle today.

Threat Hunting Services
Cybersecurity Threat Hunting Services
Faster threat containment = less attacker dwell time.
When your organization is under attack, quick response time is absolutely essential. Once a threat has infiltrated your network and the longer it remains inside, the more damage can be done. CRITICALSTART Threat Hunting Services proactively identify and investigate hidden malicious actors and quickly contain the threat.

Cybersecurity Services for Healthcare
Protecting the healthcare industry from cyber attacks
Cybersecurity designed to meet the unique challenges in the healthcare industry.

Identity is the New Perimeter
by Charlie Smith, Microsoft Solutions Principal, Critical Start
Identity based attacks are on the rise and so is the level of exposure. If you pause for a moment to think about everything your account (aka Identity) has access to -- Salesforce, Email, OneDrive, Teams, Slack, VPN, Dropbox to name a few – it’s only natural to start thinking about:

Mayhem in Manufacturing, Part II: Best Practices for Third-Party Risk Management
by: Ross Williams, Critical Start DFIR Leader

Support for Microsoft 365 Defender Extends Critical Start MDR Coverage Enterprise-wide
By Leonard Volling, Critical Start Microsoft Alliance Director

SOC vs. CSIRT: What’s the Difference?
Years ago, organizations relied primarily on their IT department to manage security. As cybersecurity attacks increased in frequency and sophistication, companies launched Security Operations Centers (SOCs) to centralize security tools and personnel.
Yet in recent years, as the number of security breaches escalated, organizations realized they needed dedicated response teams, which led to the introduction of Computer Security Incident Response Teams(CSIRTs).

Ransomware: An Attacker’s Perspective
By Randy Watkins, Critical Start Chief Technology Officer

Retailers, Why Not Give Consumers the Gift of Data Security This Holiday Season?
Consumers have historically been wary of disclosing their financial information over the internet, but the COVID-19 pandemic pushed more consumers to embrace ecommerce. Consumers spent $791.70 billion online with U.S. retailers in 2020, up 32.4% from $598.02 billion the prior year, according to a Digital Commerce 360 analysis of U.S. Department of Commerce data.

Cyber Research Unit
Cyber Research Unit (CRU)
Stay one step ahead of emerging threats