Security

The State of Cloud Security

the state of cloud security

Examining the What, Who, and Why with Blackpoint Cyber Introducing Blackpoint’s latest eBook, a...
Top Five Cloud Security Threats

top five cloud security threats

A Closer Look at the SOC’s Common Cloud Responses Don’t leave your cloud security to chance. ...
Ransomware, EDR, and the MSP Opportunity

ransomware, edr, and the msp opportunity

In just 60 minutes, Acronis experts will cover three of the hottest industry topics: ransomware, EDR...
Building Cyber Resilience in the Face of Cyber Attacks

building cyber resilience in the face of cyber attacks

#CyberIsTheNewDisaster With the increase in the quantity and sophistication of cyber events, it i...
The 5 Most Dominant Threat Actors of 2023

the 5 most dominant threat actors of 2023

These five groups—BlackCat, LockBit, QakBot, Redline Stealer, and Akira—were top of mind, as the...
How to Evaluate a SOC Prior to Investment

how to evaluate a soc prior to investment

When investigating a new security solution, it’s important to cut through the industry buzz and fi...
The EDR Gap

the edr gap

Real Cases of EDR Blind Spots, and How MDR Stepped in for the Save EDR tools are supposed to disa...
The Nastiest Malware of 2023

the nastiest malware of 2023

Malware attacks continue to surge in number and complexity, with ransomware emerging as the dominant...
Advance Cybersecurity and Zero Trust Maturity

advance cybersecurity and zero trust maturity

Watch this on-demand webinar for insights on how to instill a greater sense of confidence in your bu...