Blogs

Blog Image

2024 Critical Start Cyber Risk Landscape Peer Report Now Available

We are excited to announce the release of the 2024 Critical Start Cyber Risk Landscape Peer Report, offering invaluable insights into the current state of cybersecurity and highlighting key trends and challenges. This comprehensive report is based on a survey of over 1,000 VP+ cybersecurity professionals, providing a detailed analysis of the evolving threat landscape.

Key Insights from the Report

Blog Image

Critical Start Managed XDR Webinar — Increase Threat Protection, Reduce Risk, and Optimize Operational Costs

Did you miss our recent webinar, Stop Drowning in Logs: How Tailored Log Management and Premier Threat Detection Keep You Afloat? Steven Rosenthal, Director of Product Management covered how you can catch security threats creeping across user, cloud, and network infrastructures — and do it with known up-front costs, without a SIEM license.  

The challenges of log overload? They’re real.

Blog Image

Pulling the Unified Audit Log

During a Business Email Compromise (BEC) investigation, one of the most valuable logs is the Unified Audit Log (UAL). This log provides a comprehensive record of user and admin activities across various Microsoft 365 services. These logs are essential for monitoring, compliance, and conducting forensic investigations. There are two ways to collect them: via the Microsoft Purview Audit Tab and PowerShell.

Blog Image

Announcing the Latest Cyber Threat Intelligence Report: Unveiling the New FakeBat Variant

Critical Start announces the release of its latest Cyber Threat Intelligence Report, focusing on a formidable new variant in the cyber threat landscape: FakeBat, now identified as IvanLoader. This report provides an in-depth analysis of the variant's attack vectors, capabilities, and the innovative use of Telegram bots for command-and-control operations, marking a significant evolution in cyberattack sophistication.

Blog Image

Cyber Risk Registers, Risk Dashboards, and Risk Lifecycle Management for Improved Risk Reduction

Just one of the daunting tasks Chief Information Security Officers (CISOs) face is identifying, tracking, and mitigating cyber risks. One of the biggest obstacles they encounter with risk is the cumbersome process of manually gathering and analyzing data from disparate sources to gain a comprehensive understanding of their organization's risk posture.

Blog Image

Microsoft Copilot for Security: The MSSP Opportunity – MSSP Alert

April 2, 2024 | Microsoft's release of Copilot for Security integrates AI into its security offerings, providing MSSPs with opportunities to enhance productivity and efficiency in security operations. Despite initial concerns about pricing models and integration, the tool shows promise in augmenting SOC capabilities and creating new revenue streams for MSSPs.

Read the full article

Blog Image

Beyond SIEM: Elevate Your Threat Protection with a Seamless User Experience 

Unraveling Cybersecurity Challenges 

In our recent webinar, Beyond SIEM: Elevating Threat Protection with a Seamless User Experience, Steven Rosenthal (Director of Product Management at Critical Start) and Seth Williams (Field CTO for Partners at Sumo Logic and security industry veteran) discuss a variety of cybersecurity challenges and the importance of diverse Security Information and Event Management (SIEM) coverage options to address them.  

Blog Image

Navigating the Convergence of IT and OT Security to Monitor and Prevent Cyberattacks in Industrial Environments 

The blog Mitigating Industry 4.0 Cyber Risks discussed how the continual digitization of the manufacturing sector has made cyberattacks a constant threat to organ

Blog Image

Critical Start Cyber Risk Peer Insights – Strategy vs. Execution

Effective cyber risk management is more crucial than ever for organizations across all industries. Cyber risk peer benchmarking provides valuable insights into how organizations are performing in terms of their risk management strategies and execution. In this post—the first of an ongoing series—we’ll look at the findings of our latest peer benchmarks and explore the gap between strategy and execution in reducing cyber risk.

Blog Image

The Role of Expert Teams in MCRR: A Human-Centric Approach 

Managed Cyber Risk Reduction (MCRR) combines cyber risk monitoring technology with human-led risk and security operations to deliver continuous security posture improvement and the strongest possible protection against threats.

Blog Image

Critical Start Named a Major Player in IDC MarketScape for Emerging Managed Detection and Response Services 2024

Critical Start is proud to be recognized as a Major Player in the IDC MarketScape: Worldwide Emerging Managed Detection and Response Services 2024 (doc #US50101523, April 2024). We believe this recognition confirms our commitment to delivering innovative and effective cybersecurity solutions to our customers.

Blog Image

Spend Smarter, Risk Less: Cybersecurity ROI Strategies for Security Leaders

Economic uncertainties are compelling organizations to scrutinize every investment, and the pressure on cybersecurity leaders to justify their spending is higher than ever. Our CISO at Critical Start, George Jones, recently shared his ideas and strategies for fortifying an organization's cybersecurity posture, and demonstrated these efforts' return on investment (ROI), on the CyberWire Daily podcast.