Incident Response vs. MDR: What’s the difference?

MDR (Managed Detection and Response) and Incident Response are closely related aspects of cybersecurity. Because of their similarities, MDR and incident response are often confused as the same solution. Both are crucial components of a comprehensive cybersecurity strategy to protect organizations from evolving threats and improve their security posture. However, despite the similarities, MDR and [...]

Incident Response vs. MDR: What’s the difference? Read More »

What a CISO needs to know about cyber insurance

Cyber insurance concepts every CISO should understand Cyber insurance has become essential to any risk management strategy, as no organization can bank on its cyber defenses being 100% invulnerable. It's also essential because even a successful defense against an attack can still result in significant costs. To mitigate risk, it makes sense to invest in

What a CISO needs to know about cyber insurance Read More »

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Identity and Access Management

Embracing a Zero Trust security model within your organization can help your company decrease the chances of a potential breach. In this guide, we will share several steps your company can take to implement a Zero Trust approach to security. 1. The first step to setting up a Zero Trust model is to ensure you

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Identity and Access Management Read More »

Microsoft 365 renewal time is upon us: here are your options

Microsoft 365 is a suite of cloud-based productivity tools from Microsoft. It includes familiar applications like Word, Excel, and PowerPoint and powerful collaboration tools like Teams and SharePoint. But to use these tools, you need something called a license. If you’re buying licenses directly from Microsoft or through a CSP and your renewal is coming

Microsoft 365 renewal time is upon us: here are your options Read More »

Cut the $hIT 2023 Recapped: Five takeaways on Zero Trust Architecture

Plow Networks hosted it’s 2nd annual Cut the $hIT live podcast event this fall, with an excellent panelist lineup including Fortinet’s VP of Engineering, Clearwater’s Chief Risk Officer, Insentra’s CIO/CISO, CRC Group’s Cyber Insurance Specialist, Plow Networks’ Director of Technical Development, and one of Jamf’s Apple Security Specialists. Bryan Link, Plow Networks’ Chief Operating Officer

Cut the $hIT 2023 Recapped: Five takeaways on Zero Trust Architecture Read More »

Cut the $hIT Recapped: The importance of telecom infrastructure and the future of Fiber

Host and Plow Networks’ COO Bryan Link is joined by Executive Vice President at Mears Group, Inc. Trent Edwards to discuss the current state of telecom infrastructure. Having spent over 20 years in the telecom industry, Trent is the perfect person to teach us all about fiber. You’ve definitely heard of fiber, but what is

Cut the $hIT Recapped: The importance of telecom infrastructure and the future of Fiber Read More »

Scroll to Top