Blogs

Tim Bandos on Elevating MDR: How Critical Start Enhances Security Operations
In a recent interview on the Security Strategist Podcast, Tim Bandos, Field CISO at Critical Start, shared expert insights into how Managed Detection and Response (MDR) providers can help organizations navigate three top cybersecurity challenges by focusing on visibility, ale

The Hidden Risks: Unmonitored Assets and Their Impact on MDR Effectiveness
In the realm of cybersecurity, the effectiveness of Managed Detection and Response (MDR) services hinges critically on comprehensive asset monitoring. Despite significant investments in MDR solutions, many organizations continue to face security compromises due to unmonitored assets. This blog delves into the hidden risks associated with unmonitored assets, including non-deployed or malfunctioning security agents, and examines how these gaps can undermine the overall security posture of a business.

The Need for Symbiotic Cybersecurity Strategies | Part 2: Integrating Proactive Security Intelligence into MDR
In Part 1 of this series, The Need for Symbiotic Cybersecurity Strategies, we explored the critical need for comprehensive Managed Detection and Response (MDR) as the cornerstone of modern cybersecurity strategies. We also discussed how asset visibility is vital in enhancing MDR effectiveness by ensuring that all IT assets are accounted for and protected.

Finding the Right Candidate for Digital Forensics and Incident Response: What to Ask and Why During an Interview
So, you’re looking to add a digital forensics and incident response (DFIR) expert to your team. Great choice! But before you bring one on board, you’ve got to ask the right questions. We all know how difficult it is to find the right candidate in this industry. And hiring the wrong candidate can be detrimental to your team, whether it be team morale or poor customer satisfaction. Trust me, we’ve all been there. Whether you are new in the interviewer seat or have decades of experience, this guide can help you navigate the interview process.

The Need for Symbiotic Cybersecurity Strategies | Part I
Since the 1980s, Detect and Respond cybersecurity solutions have evolved in response to emerging cyber threats and technological innovation. These tools progressed from basic intrusion detection to sophisticated, integrated solutions capable of real-time threat detection and response, highlighting continuous cybersecurity innovation.

Critical Start H1 2024 Cyber Threat Intelligence Report
Critical Start is thrilled to announce the release of the Critical Start H1 2024 Cyber Threat Intelligence Report.

Now Available! Critical Start Vulnerability Prioritization – Your Answer to Preemptive Cyber Defense.
Organizations understand that effective vulnerability management is critical to reducing their cyber risk exposure, but many struggle with the overwhelming complexity and effort involved in deciphering and prioritizing vulnerability scan results. That’s why CRITICALSTART® now offers Vulnerability Prioritization as part of our Vulnerability Management and Managed Detection and Response Services.

Recruiter phishing leads to more_eggs infection
With additional investigative and analytical contributions by Kevin Olson, Principal Security Analyst.

2024 Critical Start Cyber Risk Landscape Peer Report Now Available
We are excited to announce the release of the 2024 Critical Start Cyber Risk Landscape Peer Report, offering invaluable insights into the current state of cybersecurity and highlighting key trends and challenges. This comprehensive report is based on a survey of over 1,000 VP+ cybersecurity professionals, providing a detailed analysis of the evolving threat landscape.
Key Insights from the Report

Critical Start Managed XDR Webinar — Increase Threat Protection, Reduce Risk, and Optimize Operational Costs
Did you miss our recent webinar, Stop Drowning in Logs: How Tailored Log Management and Premier Threat Detection Keep You Afloat? Steven Rosenthal, Director of Product Management covered how you can catch security threats creeping across user, cloud, and network infrastructures — and do it with known up-front costs, without a SIEM license.
The challenges of log overload? They’re real.

Pulling the Unified Audit Log
During a Business Email Compromise (BEC) investigation, one of the most valuable logs is the Unified Audit Log (UAL). This log provides a comprehensive record of user and admin activities across various Microsoft 365 services. These logs are essential for monitoring, compliance, and conducting forensic investigations. There are two ways to collect them: via the Microsoft Purview Audit Tab and PowerShell.

Announcing the Latest Cyber Threat Intelligence Report: Unveiling the New FakeBat Variant
Critical Start announces the release of its latest Cyber Threat Intelligence Report, focusing on a formidable new variant in the cyber threat landscape: FakeBat, now identified as IvanLoader. This report provides an in-depth analysis of the variant's attack vectors, capabilities, and the innovative use of Telegram bots for command-and-control operations, marking a significant evolution in cyberattack sophistication.