All Things Cybersecurity at Your Fingertips.
Stay Ahead of the Game: Monitor Failed Authentications to Prevent Brute Force Attacks
Apr 03, 2023
Why is it in your best interest to monitor failed authentications?
Microsoft 365 Alerts - How to Take Full Advantage of Them
Feb 20, 2023
Microsoft 365 has a wealth of security features and settings you can configure and implement to harden the security of your tenant. Among these are...
If it mails like a qak, signs like a qak and injects like a qak, it’s definitely a qakbot.
Dec 19, 2022
Ever since 2007 when the first samples were observed in the wild, QBot (also known as Qakbot or Pinkslipbot) suffered multiple transformations and...
Malware Reverse Engineering (MRE)
Nov 30, 2022
Curiosity is one of the things that drives humanity further. It is this trait that has led to some of the greatest inventions.
The Microsoft 365 Security Series – Multi-Factor Authentication
Sep 07, 2022
Microsoft 365, formerly known as Office 365, is a line of subscription services offered by Microsoft which adds to and includes the Microsoft Office...
Owning a SIEM vs the Managed SIEM vs MDR/XDR
Aug 31, 2022
Security Information and Event Management (SIEM) software is a cybersecurity tool that collects information about different events across your entire...
How Do We Build A Business Case For A SOC?
Aug 29, 2022
Once it has been confirmed that there is interest in employing the services of a SOC and the technical benefits have been aligned with organizational...
What Motivates a Hacker?
Jul 21, 2022
Cyber attacks happen every day, and it’s no secret that they are increasing in frequency and sophistication. While threat actors generally don’t...
D9 Technologies and Gradient Cyber Join Forces to Provide Secure, Stable IT Environments
Jul 12, 2022
The partnership enables customers to protect their businesses from potentially business-crippling attacks. DALLAS, TX – July 12, 2022 – Gradient...
11 Ways to Boost the Cyber Defenses of Small Businesses
May 24, 2022
While no business is immune to cybersecurity attacks, small and medium sized businesses are especially vulnerable. In a survey conducted with small...
Living Security Partners with Gradient Cyber to Bring Leading, Managed Security Awareness and Training Solutions to Small and Midmarket Enterprises
May 19, 2022
AUSTIN, Texas, May 19, 2022 - Living Security, the leader in Human Risk Management, today announced a strategic business partnership with Gradient...
What is a SOC, and What Benefits Can We Expect?
May 17, 2022
Businesses of all sizes today are highly, if not 100 percent, reliant on their digital communications infrastructure, making cybersecurity and 24/7...
Do We Need a SOC, and If So, Why?
May 17, 2022
The nature of the ongoing threat landscape has escalated the issue of cybersecurity into the board room of organizations. It is no longer possible to...
CISO Advisory Services
Full-time, interim, or fractional CISO services to fit any need including: security strategies, and governance and compliance services. Our CISO...