Our privacy policy is located here.
Company
Partners
Blog
DOJ Adds Manpower to Disrupt and Prosecute Nation-State Actors
CL0P Ransomware, MOVEit-related Vulnerabilities, and Actions to Defend Against Ransomware Attacks
Cybersecurity Trends, Notable Vulnerabilities and Threat Hunting Tactics
AI Alone is Not the Answer to Cybersecurity; Humans are Needed Too
The Human Element: The Key to a Successful Cybersecurity Strategy
Supply Chain Attack Against 3CXDesktopApp
With Ransomware on the Rise, What’s a Company to Do?
How HIPAA Regulations Affect Online Tracking
A Holiday of Sophisticated Phishing
The State of Cybersecurity in Retail
Retailers Prepare for the Holiday Season—and Cybersecurity Threats
Downgraded but Still Dangerous: Continue to Take the OpenSSL Vulnerabilities Very Seriously
Safeguard Rules: 9 Steps to Compliance for Auto Dealerships
Pumpkin Spice Latte and a Side of Cybersecurity Awareness Month
Zero-Day Microsoft Exchange Server Vulnerabilities Exposed Early Due to Limited Targeted Attacks
The State of Cybersecurity in Education
The Preventable Scam: Fraudulent Wire Transfer
Pondurance Innovations and Integrations for Cloud Security
Healthcare Tops List for Cost of a Data Breach, Again
DIY or partner for 24/7 cybersecurity? Partner. Here’s why.
The SMB Path to Modern, Mature Cybersecurity
Do SMBs have Security Operations Centers, or SOCs?
Customizable Packages and Pricing: One Size Does Not Fit All
Modern Challenges Require Modern Solutions — The SMB Path to Comprehensive Cybersecurity
The SMBs 24/7 Challenge, Cybercriminals Work Around-The-Clock-Shouldn’t You?
Lessons Can Be Learned from the HHS Audit
Pondurance Innovations Delivering Client Success: Q2 2022 Update
As the Threat Landscape Shifts, Modern MDR Must Go Beyond Regular Solutions
Making the Right Decision: How to Choose an MDR Provider
Critical Diagnosis: What You Can Do To Mitigate the Scourge of Microsoft CVE-2022-30190
MDR: How it Compares and How to Choose a Provider
Dwell Time Can Impact the Outcome of a Cyber Attack
Pondurance Partners with CrowdStrike to Expand Award-Winning MDR Offering
Legislators Take Steps to Enhance Cybersecurity in Healthcare. Will it help?
Unpatched Vulnerabilities Put Healthcare Organizations at Risk
K-12 School Districts and the Cybersecurity Challenges
“Oh, No You Don’t!” How to Recognize and Prevent a Spear Phishing Attack
Pondurance Delivers Managed Security Services as Dynamic as Your Business
Communicating Healthcare Cyber Risks to Your Board of Directors
The NYDFS Cybersecurity Regulation: A Harbinger of More to Come
MDR Deep Dive: What it Offers and What to Look for
MDR, MSSP, and SIEM: Which is Right for You?
We Are the World: Cyber Precautions to Take Due to the Russia-Ukraine Conflict
Resources
Case Studies
Hospital Experienced Ransomware Threat, Undetected by EDR
Azul Hospitality Group Safeguards Guest Data with MDR for Endpoints
Hylant Protects Against Cyber Risk with MDR Services
Pondurance as an Extension of a Large Retail Supercenter SOC
Pondurance Incident Response, Threat Hunting, and MDR for Retailers
Ball State University Partnering to Provide 24/7/365 MDR Protection
Joplin School District Improves their Cybersecurity Posture with Managed Detection and Response
Large Hospital System Hit By Vice Society Ransomware Attack
Malware Thwarted: MDR Manufacturing Case Study
Pondurance Incident Response (IR) for Manufacturing
Pondurance Managed Detection and Response for Healthcare Case Study
Checklists
Microsoft 365 and Azure Active Directory Information Security Best Practices
IT Infrastructure Information Security Best Practices
How to Respond to Business Email Compromise Threats
How to Protect Against BEC Threats
How to Combat Phishing in Office 365
Key Steps to Include in Your Incident Response Plan
Back to School: Keeping Students and Teachers Safe Online
eBooks
Risk-Based Cybersecurity Protects What’s Most Important
Practical Cybersecurity: A Roadmap for Retailers
Cybersecurity Predictions for 2023
Modern MDR for Retailers: Your Ultimate Guide
Modern Managed Detection and Response for Healthcare Providers
Demystifying MDR: Your Ultimate Guide to Managed Detection and Response
Practical Cybersecurity: A Roadmap for your Healthcare Organization
What Schools Should Consider when Choosing a Managed Detection and Response (MDR) Provider
5 Things to Consider When Choosing an MDR Vendor
5 MDR Considerations for Healthcare Providers
3 Techniques for Stopping Domain Controller Attacks
Cyber Priorities: 6 Cybersecurity Investments You Should Consider in 2022
5 Ways to Invest Your Remaining InfoSec Budget
Top 10 Cybersecurity Predictions for 2022
Practical Cybersecurity: A Roadmap for Your Business
3 Ways to Reduce Ransomware Attacks
5 Ways to Protect Against Cryptojacking
3 Essential Methods to Improve Data Privacy
FAQS
Infographics
Threat Actors Work Around the Clock, But Most SMB’s Don’t
10 Things to Remember About MDR
Follow the NIST Cybersecurity Framework by Asking the Right Questions
Human vs Tech: Why You Need Both to Defend Against Ransomware
Cybersecurity Maturity Model Certification (CMMC) Readiness Assessment
Podcasts
Press Releases
New Study Shows a Majority of SMB’s Lack 24/7 Operations Centers to Detect and Respond to Threats
Pondurance Appoints Mike Sherwood as Vice President of Sales
CRN Features Pondurance in 2022 Partner Program Guide
Pondurance Wins Gold in the Cybersecurity Excellence Awards
Pondurance Partners with Cybersecurity Solutions Leader Guidepoint Security
Pondurance Launches New Channel Partner Program
Pondurance Launches Cyber Risk Assessments Powered by MyCyberScorecard
Pondurance Named in the 2021 Gartner Market Guide for Managed Detection and Response
Pondurance Achieves Registered Provider Organization (RPO) Accreditation from CMMC
Pondurance Appoints Jimmy Tsang as Vice President of Marketing
Product & Services
Gartner Now Recommends What Pondurance Has Provided from the Start
Pondurance MDR is the Solution Your Business Needs — Here’s Why
Managed Detection and Response (MDR) for Endpoints
Managed Detection and Response (MDR) Services for Networks
Managed Detection and Response (MDR) Services for Logs
Managed Detection and Response (MDR) Services
Are You Looking for PCI DSS Compliance?
Do You Need a NIST Cybersecurity Framework Assessment?
Are You Keeping Up with HIPAA Compliance?
Managed Detection and Response (MDR) for Private Equity and Venture Capital
Cyber Risk Assessments Powered by MyCyberScorecard
Virtual Chief Information Security Officer (vCISO)
Vulnerability Management Program (VMP)
Vulnerability Management Program (VMP) for Healthcare
Incident Response (IR) for Healthcare
Managed Detection and Response (MDR) for Healthcare Organizations
Research
Gartner 2023 Market Guide for Managed Detection and Response
Cybersecurity Challenges for Midsize Healthcare Providers
Forrester Analyst Report: Attackers Don’t Sleep, But Your Employees Need To
Managed Detection and Response (MDR) for Dummies
Gartner 2021 Market Guide for Managed Detection and Response
Video Library
Modern MDR: Why It’s Mission-Critical
Understanding and Preventing Fraudulent Wire Transfers
The Roadway to Modern Managed Detectiona and Response
How Do I Prevent Getting Hacked?
Defining Modern MDR at RSA Conference
Cyber Conflict and International Relations
Complexities of Cyber Attribution Panel with Niloofar Razi Howe