What is a DDOS Attack? With their surging popularity, you might be surprised to learn that DoS (Denial of Service) and DDoS (Distributed Denial-of-Service) attacks have actually been around for…
Cloud Security Best Practices With cloud computing, security has always been one of the biggest concerns among enterprises considering its adoption. The idea that sensitive data and key applications will…
How to stop phishing attacks - Stop Email Security Threats Time and time again we have seen that the weakest link within a cybersecurity system is the people - It…
The Five Pillars of Cloud Security With more and more people shifting toward remote work - companies have begun to rely more on cloud providers as a result. Over the…
How to Choose an MDR Solution - Key Things you Should Consider One consequence of the changing threat landscape is that security teams are quickly becoming overwhelmed by the sheer…
MDR vs MSSP - Comparing Managed Security Offerings Traditionally, MSSPs have been the go-to solution for network security as technology stacks in modern organizations grow increasingly complicated and difficult to…
What Makes a Modern SOC? With the threat landscape more challenging than ever, every organization should have a dedicated security operations center. A Modern SOC helps organizations detect, monitor and…
What is Attack Surface Management? Attack surface management is defined as the continuous discovery, inventory, classification and monitoring of an organization's external digital assets. In short, it is the management…
Stratejm Wins Fortinet’s MSSP Partner of the Year Award Mississauga Ontario, March 16th, 2022 — Stratejm, announced today that it was named Fortinet’s MSSP Partner of the Year.…
Extended Detection and Response - Explained In a recent blog post, we defined Extended Detection and Response (XDR) as an evolution of EDR, unifying security-relevant endpoint detection with telemetry data…