Cybersecurity Team

Stay Ahead of the Game: Monitor Failed Authentications to Prevent Brute Force Attacks

Apr 03, 2023

Why is it in your best interest to monitor failed authentications?

Read More
Microsoft 365 Alerts - How to Take Full Advantage of Them

Microsoft 365 Alerts - How to Take Full Advantage of Them

Feb 20, 2023

Microsoft 365 has a wealth of security features and settings you can configure and implement to harden the security of your tenant. Among these are...

Read More
Phishing, Ransomware, Cyberattack

If it mails like a qak, signs like a qak and injects like a qak, it’s definitely a qakbot.

Dec 19, 2022

Ever since 2007 when the first samples were observed in the wild, QBot (also known as Qakbot or Pinkslipbot) suffered multiple transformations and...

Read More
Malware, Malware Detection and Analysis

Malware Reverse Engineering (MRE)

Nov 30, 2022

Curiosity is one of the things that drives humanity further. It is this trait that has led to some of the greatest inventions.

Read More
The Microsoft 365 Security Series – Multi-Factor Authentication

The Microsoft 365 Security Series – Multi-Factor Authentication

Sep 07, 2022

Microsoft 365, formerly known as Office 365, is a line of subscription services offered by Microsoft which adds to and includes the Microsoft Office...

Read More
Cybersecurity, SIEM, Extended Detection and Response, Managed Detection and Response

Owning a SIEM vs the Managed SIEM vs MDR/XDR

Aug 31, 2022

Security Information and Event Management (SIEM) software is a cybersecurity tool that collects information about different events across your entire...

Read More
How Do We Build A Business Case For A SOC?

How Do We Build A Business Case For A SOC?

Aug 29, 2022

Once it has been confirmed that there is interest in employing the services of a SOC and the technical benefits have been aligned with organizational...

Read More
Hackers and Cybersecurity

What Motivates a Hacker?

Jul 21, 2022

Cyber attacks happen every day, and it’s no secret that they are increasing in frequency and sophistication. While threat actors generally don’t...

Read More
Partnership Cybersecurity

D9 Technologies and Gradient Cyber Join Forces to Provide Secure, Stable IT Environments

Jul 12, 2022

The partnership enables customers to protect their businesses from potentially business-crippling attacks. DALLAS, TX – July 12, 2022 – Gradient...

Read More
Small midsize business cybersecurity

11 Ways to Boost the Cyber Defenses of Small Businesses

May 24, 2022

While no business is immune to cybersecurity attacks, small and medium sized businesses are especially vulnerable. In a survey conducted with small...

Read More
Living Security Partners with Gradient Cyber to Bring Leading, Managed Security Awareness and Training Solutions to Small and Midmarket Enterprises

Living Security Partners with Gradient Cyber to Bring Leading, Managed Security Awareness and Training Solutions to Small and Midmarket Enterprises

May 19, 2022

AUSTIN, Texas, May 19, 2022 - Living Security, the leader in Human Risk Management, today announced a strategic business partnership with Gradient...

Read More
Security Operations Center (SOC)

What is a SOC, and What Benefits Can We Expect?

May 17, 2022

Businesses of all sizes today are highly, if not 100 percent, reliant on their digital communications infrastructure, making cybersecurity and 24/7...

Read More
Security Operations Center (SOC)

Do We Need a SOC, and If So, Why?

May 17, 2022

The nature of the ongoing threat landscape has escalated the issue of cybersecurity into the board room of organizations. It is no longer possible to...

Read More
CISO Advisory Services

CISO Advisory Services

Full-time, interim, or fractional CISO services to fit any need including: security strategies, and governance and compliance services. Our CISO...

Read More