Blogs

Blog Image

Virtual CISO Services (vCISO)

Virtual CISO Services (vCISO)

Virtual security advisory to build out your strategic security framework.

Our team of former CISOs can provide the technical and executive leadership your organization needs to build and maintain a comprehensive strategy to defeat threats and keep pace with the latest attack profiles.

Blog Image

IDC Survey Points to Value of MDR in Helping Companies Resolve Security Alerts

Companies of all sizes are failing to investigate an alarming number of security alerts – as many as one-third – and are spending about as long investigating false positives as they do actionable alerts.

Blog Image

In Cybersecurity Every Alert Matters | IDC White Paper

In Cybersecurity Every Alert Matters

Skip to download

A cybersecurity practitioner has one of the hardest jobs to tackle today.

Blog Image

Threat Hunting Services

Cybersecurity Threat Hunting Services

Faster threat containment = less attacker dwell time.

When your organization is under attack, quick response time is absolutely essential. Once a threat has infiltrated your network and the longer it remains inside, the more damage can be done. CRITICALSTART Threat Hunting Services proactively identify and investigate hidden malicious actors and quickly contain the threat.

Blog Image

Cybersecurity Services for Healthcare

Protecting the healthcare industry from cyber attacks

Cybersecurity designed to meet the unique challenges in the healthcare industry.

Watch Killware webinar recording

Blog Image

Identity is the New Perimeter

by Charlie Smith, Microsoft Solutions Principal, Critical Start

Identity based attacks are on the rise and so is the level of exposure.  If you pause for a moment to think about everything your account (aka Identity) has access to -- Salesforce, Email, OneDrive, Teams, Slack, VPN, Dropbox to name a few – it’s only natural to start thinking about:     

Blog Image

Support for Microsoft 365 Defender Extends Critical Start MDR Coverage Enterprise-wide

By Leonard Volling, Critical Start Microsoft Alliance Director 

Blog Image

SOC vs. CSIRT: What’s the Difference?

Years ago, organizations relied primarily on their IT department to manage security. As cybersecurity attacks increased in frequency and sophistication, companies launched Security Operations Centers (SOCs) to centralize security tools and personnel.

Yet in recent years, as the number of security breaches escalated, organizations realized they needed dedicated response teams, which led to the introduction of Computer Security Incident Response Teams(CSIRTs).

Blog Image

Ransomware: An Attacker’s Perspective

By Randy Watkins, Critical Start Chief Technology Officer

Blog Image

Retailers, Why Not Give Consumers the Gift of Data Security This Holiday Season?

Consumers have historically been wary of disclosing their financial information over the internet, but the COVID-19 pandemic pushed more consumers to embrace ecommerce. Consumers spent $791.70 billion online with U.S. retailers in 2020, up 32.4% from $598.02 billion the prior year, according to a Digital Commerce 360 analysis of U.S. Department of Commerce data.

Blog Image

Cyber Research Unit

Cyber Research Unit (CRU)

Stay one step ahead of emerging threats