Elementor #8029

Writing blogs about cyber incidents and threats from the past year.


CrowdStrike Update Created Widespread Outage

As a recap, a widespread Microsoft Windows outage began on July 19 and expanded throughout the day due to a CrowdStrike content update for Microsoft Windows hosts. Pondurance and its systems were not affected by the issue, and Pondurance continued its security services delivery without incident. What happened During the outage, Windows computers experienced a


Read More »


Assessing Third-Party Risk in the Healthcare Sector

Many organizations rely on third parties, including vendors, partners, suppliers, and contractors, to keep their operations up and running. Often, third parties are granted access to an organization’s critical systems, networks, and sensitive data, putting the organization at risk of a cyberattack or data breach originating with the third party. Any vulnerability or gap in


Read More »

bec threat response checklist


Recover Using a Risk-Based Approach

Identify, protect, detect, respond, and recover are the five categories that the National Institute of Standards and Technology (NIST) uses in its NIST Cybersecurity Framework. This guideline can help organizations assess and manage their cybersecurity risks. Pondurance, a managed detection and response (MDR) services provider with a 24/7 security operations center, aligns its service lines


Read More »


Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for May 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In May, the team discussed threat intelligence, vulnerabilities and trends, threat hunting, and the product road map. Threat Intelligence The Senior Digital Forensics and Incident Response (DFIR) Consultant discussed trends from the first quarter that have continued through April,


Read More »

Encrypted data visual


Protect, Detect, and Respond Using a Risk-Based Approach

The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides guidelines for organizations to use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover. Pondurance, a managed detection and response services provider with a 24/7 security operations center (SOC), uses those same five categories to develop cybersecurity programs for


Read More »

malware


Identify Your Cybersecurity Risk Using a Risk-Based Approach

The National Institute of Standards and Technology (NIST) has laid out the Cybersecurity Framework as a set of guidelines that offers outcomes that organizations can use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover.  Pondurance, a managed detection and response services provider with a 24/7 security operations center, aligns its service lines with


Read More »