Blogs

Blog Image

Beyond the Endpoint: Detect and Disrupt User Account Attacks

By: Chris Carlson, VP of Product Management

“What’s in a name?” For Shakespeare, it’s the start of a famous soliloquy in a play about blossoming love. For cybersecurity professionals - if that name is a compromised user account leading to administrative privileges – it’s the start of an attack vector that’s been difficult to detect, disrupt, or contain.

Blog Image

XDR 101: What is Extended Detection and Response?

Extended Detection and Response (XDR) is by far one of the hottest topics and trends in cybersecurity today.

Blog Image

XDR 101: What is Extended Detection and Response

XDR 101:

What is Extended Detection & Response

Blog Image

Assessing Recent Cyber Threats as Russia-Ukraine Crisis Escalates

Critical Start continues to monitor opportunities for detection, focused on the tactics, techniques, and procedures commonly employed by Russian threat actors.
Blog Image

Log4Shell: Information Security Teams Served Coal for Christmas

By now you've probably heard of Log4Shell, Log4j or LogJam - more formally known as CVE-2021-44228.

Blog Image

Cybersecurity Services for Healthcare

Protecting the healthcare industry from cyber attacks

Cybersecurity designed to meet the unique challenges in the healthcare industry.

Watch Killware webinar recording

Blog Image

Support for Microsoft 365 Defender Extends Critical Start MDR Coverage Enterprise-wide

By Leonard Volling, Critical Start Microsoft Alliance Director 

Blog Image

Request a Demo - Microsoft Ignite

Request a Demo

Demo the platform and mobile app that deliver industry-leading

managed detection and response (MDR) services

One of our product experts will walk you through our platform, ZTAP, and the MOBILESOC app. They will explain how our SOC is able to solve every alert and answer any questions you have.

[gravityform id="23" title="false" description="false" ajax="true" tabindex="49" field_values="check=First Choice,Second Choice"]

Blog Image

Cybersecurity Services for Government

Protecting governments from cybersecurity threats

Cybersecurity services designed for the unique challenges of state & local governments.

Government’s Role in Cybersecurity

Blog Image

Meet the Experts

Meet the Experts

Technical Experts

Meet some of the SOC analysts and onboarding engineers that make Critical Start’s industry leading Managed Detection and Response services possible.

Lead Cybersecurity Engineer Jacob Welter explains how Critical Start onboards new Managed Detection and Response customers, including how we help them optimize their EDR, SIEM & XDR tools.

Blog Image

Anatomy of an Attack | Ransomware

Ragnarlockbit - A real world attack

Skip to download

CRITICALSTART’s Incident Response (IR) team was recently engaged by a mid-size bank that was victimized by the RagnarLockbit ransomware. The client paid the ransom, only to be re-infected twice and making a second payment. That's when CRITICALSTART came in.