Welcome to your go-to destination for cybersecurity resources and education. Dig in and find a range of materials made to empower users of all levels with the knowledge and tools to defend against evolving cyber threats.
Solving the SIEM Problem
Small-Business G2 Grid® Report for Endpoint Detection & Response (EDR)
Looking to understand your Endpoint Detection and Response options? With so many products to choose from, it can be hard to know which solutions deliver real value, especially with most EDRs not being built for the needs of small and mid-sized organizations. But authenticated reviews from companies like yours can help you know what to expect from a tool.
Read the report drawn from up-to-date user reviews, Small-Business G2 Grid® Report for Endpoint Detection & Response (EDR), to see how Huntress compares to other platforms.
The Huntress Advantage: How Huntress Protects SMBs
The State of Cybersecurity for Mid-Sized Businesses in 2023
Cyber attacks are the biggest threat to businesses like yours. Are you at risk?
New research conducted by Virtual Intelligence Briefing (VIB) reveals that 1 in 4 mid-sized businesses suffered a cyber attack or were unsure if they suffered an attack in the last 12 months.
The report, which surveyed 250+ IT professionals in mid-sized businesses, also found that many feel understaffed, under-resourced and unprepared to face today’s evolving threats. The most significant challenges include:
Download the full research report to dive into where mid-sized businesses have critical gaps in both talent and tools, how cybersecurity spending and outsourcing are trending, and how businesses like yours can better defend against cyber attacks.
The MSP Cybersecurity Journey: Guiding Your Customers Toward Success
The teams at Huntress & DNSFilter teamed up to create a guide for MSPs on how to tailor the security conversation with their clients based on maturity. After reading, you'll feel confident answering:
What Have You Done for Me Lately: Communicating the Value of Cybersecurity in Your QBRs
Leading a quarterly business review (QBR) is a great way to reinforce the value of your products and services to your clients.
But when it comes to cybersecurity, no news is good news. So how do you communicate that in your QBR?
To get some tried-and-true advice, we’re bringing together two experts. Join Alex Farling of Lifecycle Insights and Ethan Tancredi of Huntress as they explore:
Mark your calendar and get ready to learn how to have meaningful QBRs that won’t leave clients wondering, “what have you done for me lately?”
What Every MSP Should Know about Cyber Insurance
It's no surprise that cyber insurance is a hot topic in the MSP community. The list of carrier requirements continues to grow, and your clients may be relying on you for advice and guidance on their policies. Andrew Meier of Huntress and Wes Spencer of FifthWall Solutions will dive deep into cyber insurance from a service provider’s perspective. We’ll share tips and insights on:
Understanding the Operational Impact of GDAP
As a response to the partner community's requests for increased access and control, Microsoft has changed its Delegated Admin Privileges (DAP) authentication control to Granular Delegated Admin Privileges (GDAP).
The transition is well underway.
Although Microsoft has started deprecating DAP authentication, many partners and service providers have not begun the process and still have many questions. To help ease the transition, the expert team at Huntress is here to help you navigate this change and understand the impact of this update and how you can continue to engage with your customers.
Watch an in-depth discussion as Microsoft MVPs Kelvin Tegelaar, and Nick Ross, Huntress' Dave Kleinatland and Josh Lambert provide a breakdown of GDAP and how to navigate this new security control.
During this informative webinar, we will review:
By watching this webinar, you will be fully armed to set up GDAP for success and get the control you need.
A Peek Inside Threat Research: Dissecting a RAT
There’s no denying the importance of security software in today’s fight against cybercriminals—but automation and alerting is only half the battle. In this on-demand webinar, Huntress Senior Security Engineer Dave Kleinatland highlights the importance of moving beyond automation with human threat hunting—and takes an under-the-hood look at a RAT to show how IT resellers can identify and respond to modern threats.
Watch Huntress Senior Security Engineer Dave Kleinatlant dissect a RAT and highlight the importance of human threat hunting in modern cybersecurity.
Back to Security Basics
You’ve added the right tools to your security stack and have checked every acronym box. But how often are you ensuring you have good cyber hygiene?
The fundamentals of cybersecurity (like MFA and least privilege) are an important part of a strong defense. You may have a basic strategy for your cyber hygiene, but when was the last time your team actually reviewed that strategy?
Watch our webinar to hear our panel of MSPs and experts as they discuss how they ensure good cyber hygiene. Our panelists will share expert tips on how often they review their plans, lessons they learned the hard way and the importance of including clients in the discussion. As an added bonus, all attendees will get a Back to Basics checklist to help you get started.
Read more in Security Hygiene Checklist blog post too.
BYOC2: Bring Your Own Command and Control
We live in a security industry where the best mindset is to assume compromise. The hackers are already inside our network—but then what happens? In some cases, they might exfiltrate data or run post-exploitation with their C2 or “Command and Control” access.
In this session, we’ll explore artifacts from a real security incident where evidence of a hacker’s custom C2 framework was left behind. Watch as we pull back the curtain and highlight how this threat actor maintained their access and controlled their victims—and why understanding the offense can help you bolster your defense.
Building a Threat-Informed Security Program Using the Cyber Defense Matrix
The proliferation of security tools and solutions has exploded over the past years. Costly ransomware and supply chain attacks have placed significant losses on insurance companies resulting in massive premium increases and in many cases, large reductions in coverage limits. Cyber insurance questionnaires have become the unregulated “regulator” leaving many businesses and MSPs wondering, do I have the “right” security controls and processes in place?
Sounil Yu has built a model, the Cyber Defense Matrix, that helps to answer that essential question; do I have gaps in my security stack and how can I easily spot what they are?
Join Sounil and Garrett Gross of Huntress to dive into how to understand and apply the Cyber Defense Matrix. During this webinar you will learn:
The Evolution of The Huntress Managed Security Platform & What’s Next
Let’s be real—the cybersecurity landscape is built to serve enterprise-level organizations that have hefty budgets and limitless resources. That leaves 99% of businesses in the US—those small to midsized businesses—without the resources to afford the protection they need to fight today’s savvy threat actors.
And that’s why Huntress exists.
Join us to hear from our product and leadership teams on how we’ve invested in our managed security platform over the years, where we are today, and the exciting plans we have for product and talent in the near future.
During this webinar, we'll cover:
We're committed to serving the 99%, and that mission impacts every decision we make. Attend the webinar to see how we’ve put those words into action. 😉
The Missing Piece: Detection and Response
Have you heard about Huntress but not sure why you need it? We know that no one says it better than our partners, so we're excited to have Jason Hahn, IT Operations Manager at Computer Solutions join us to share:
The True Value of People-Powered Cybersecurity
Tired of feeling overwhelmed by today’s cybersecurity landscape? You're not alone. There’s a better way to keep up with rising threat levels without breaking the bank or exhausting employees.
This white paper provides valuable insights on how businesses can approach security in a more effective and efficient way—and the key is having a team of always-on security experts, like Huntress' 24/7 SOC, in your back pocket.
Download our white paper to dive into the realities of today's cyber challenges and see how to overcome them. You’ll learn how fully managed, people-powered cybersecurity can reduce the burden on IT teams and save valuable time and money in the long run.
Don't let cybersecurity challenges hold you back. Download our white paper and discover the benefits of people-powered cybersecurity designed for businesses like yours.
The Ransomware Lifecycle: From Email to Infection
Email is the easiest and cheapest way for hackers to deliver ransomware. With just a catchy subject line and a few sentences of text, hackers can reel in victims and convince them to click on a weaponized URL or attachment. Vade joins Huntress to explore the lifecycle of ransomware from email to infection. We examine the various techniques hackers use to bypass email filtering and explore the evolution of a ransomware attack when installed on a system.
Watch the webinar to learn:
Book a personalized demo to look at Huntress under the hood, explore the dashboard, and ask questions to our experts.
Book A Demo