Blogs

Blog Image

Tim Bandos on Elevating MDR: How Critical Start Enhances Security Operations

In a recent interview on the Security Strategist Podcast, Tim Bandos, Field CISO at Critical Start, shared expert insights into how Managed Detection and Response (MDR) providers can help organizations navigate three top cybersecurity challenges by focusing on visibility, ale

Blog Image

The Hidden Risks: Unmonitored Assets and Their Impact on MDR Effectiveness

In the realm of cybersecurity, the effectiveness of Managed Detection and Response (MDR) services hinges critically on comprehensive asset monitoring. Despite significant investments in MDR solutions, many organizations continue to face security compromises due to unmonitored assets. This blog delves into the hidden risks associated with unmonitored assets, including non-deployed or malfunctioning security agents, and examines how these gaps can undermine the overall security posture of a business.

Blog Image

The Need for Symbiotic Cybersecurity Strategies | Part 2: Integrating Proactive Security Intelligence into MDR

In Part 1 of this series, The Need for Symbiotic Cybersecurity Strategies, we explored the critical need for comprehensive Managed Detection and Response (MDR) as the cornerstone of modern cybersecurity strategies. We also discussed how asset visibility is vital in enhancing MDR effectiveness by ensuring that all IT assets are accounted for and protected.

Blog Image

Finding the Right Candidate for Digital Forensics and Incident Response: What to Ask and Why During an Interview

So, you’re looking to add a digital forensics and incident response (DFIR) expert to your team. Great choice! But before you bring one on board, you’ve got to ask the right questions. We all know how difficult it is to find the right candidate in this industry. And hiring the wrong candidate can be detrimental to your team, whether it be team morale or poor customer satisfaction. Trust me, we’ve all been there. Whether you are new in the interviewer seat or have decades of experience, this guide can help you navigate the interview process.

Blog Image

The Need for Symbiotic Cybersecurity Strategies | Part I

Since the 1980s, Detect and Respond cybersecurity solutions have evolved in response to emerging cyber threats and technological innovation. These tools progressed from basic intrusion detection to sophisticated, integrated solutions capable of real-time threat detection and response, highlighting continuous cybersecurity innovation.

Blog Image

Now Available! Critical Start Vulnerability Prioritization – Your Answer to Preemptive Cyber Defense.

Organizations understand that effective vulnerability management is critical to reducing their cyber risk exposure, but many struggle with the overwhelming complexity and effort involved in deciphering and prioritizing vulnerability scan results. That’s why CRITICALSTART® now offers Vulnerability Prioritization as part of our Vulnerability Management and Managed Detection and Response Services.  

Blog Image

Recruiter phishing leads to more_eggs infection

With additional investigative and analytical contributions by Kevin Olson, Principal Security Analyst.

Blog Image

2024 Critical Start Cyber Risk Landscape Peer Report Now Available

We are excited to announce the release of the 2024 Critical Start Cyber Risk Landscape Peer Report, offering invaluable insights into the current state of cybersecurity and highlighting key trends and challenges. This comprehensive report is based on a survey of over 1,000 VP+ cybersecurity professionals, providing a detailed analysis of the evolving threat landscape.

Key Insights from the Report

Blog Image

Critical Start Managed XDR Webinar — Increase Threat Protection, Reduce Risk, and Optimize Operational Costs

Did you miss our recent webinar, Stop Drowning in Logs: How Tailored Log Management and Premier Threat Detection Keep You Afloat? Steven Rosenthal, Director of Product Management covered how you can catch security threats creeping across user, cloud, and network infrastructures — and do it with known up-front costs, without a SIEM license.  

The challenges of log overload? They’re real.

Blog Image

Pulling the Unified Audit Log

During a Business Email Compromise (BEC) investigation, one of the most valuable logs is the Unified Audit Log (UAL). This log provides a comprehensive record of user and admin activities across various Microsoft 365 services. These logs are essential for monitoring, compliance, and conducting forensic investigations. There are two ways to collect them: via the Microsoft Purview Audit Tab and PowerShell.

Blog Image

Announcing the Latest Cyber Threat Intelligence Report: Unveiling the New FakeBat Variant

Critical Start announces the release of its latest Cyber Threat Intelligence Report, focusing on a formidable new variant in the cyber threat landscape: FakeBat, now identified as IvanLoader. This report provides an in-depth analysis of the variant's attack vectors, capabilities, and the innovative use of Telegram bots for command-and-control operations, marking a significant evolution in cyberattack sophistication.