Author: Zachary Madison

  • MACS 2024 CEO & Leadership Fall Conference

    MACS 2024 CEO & Leadership Fall Conference

    Come visit our exhibition table and listen to us present a mini workshop on “Cyber Security for Health Providers”

  • Cyber Threat Hunting

    Cyber Threat Hunting

    Through threat hunting and incident response, hackers can be thwarted from achieving their goals during an active compromise. Threat hunting leverages intelligence to proactively seek and find MCAs on a network, whereas incident response seeks to scope, contain, and eliminate an identified MCA.  Therefore, successful threat hunting triggers incident response actions.