If you are like me and are responsible for budgets or perhaps get yelled at over the budgets you approve, do you get cold sweats before you look at an invoice from AWS, Azure, or other platform providers with usage-based pricing models? To be candid, it's the wild...

Tony Pietrocola
3 Misconceptions About Vulnerability Scanning
Cybercriminals are known for their relentlessness and ability to exploit hidden vulnerabilities and misconfiguration errors across a firm’s applications, endpoints, servers, and networks. Vulnerabilities can be one of the biggest threats to a firm’s network; that’s...
A Month Check-in After a Needle-Moving Acquisition
Being a realist, we all know acquisitions can be a gamble. As an optimist, I look at them as a game changer that can be an absolute launch point to long-term success. Of course, business history is riddled with stories of acquisitions that have gone wrong, but rarely...
Top 3 Reasons SMBs Should Use SIEM
Security Information and Event Management– otherwise known as SIEM, is a cybersecurity solution that monitors an organization’s IT infrastructure by relaying actionable intelligence and allowing IT security teams to manage potential threats. SIEM provides...
Cloud Misconfiguration: What it is & How to Avoid it?
The recent rise in cyber threats comes as a result of the increase in cloud adoption across the globe, intending to increase business agility and resilience. However, that doesn’t mean electing to use cloud-based-hosted environments will make an organization more...
Old School Threat Detection Just Won’t Hack it Anymore
Global cybercrime continues to surge this year – government officials, business leaders, and software developers are scrambling to stay one step ahead of cyber criminals. Although software developers aim to create the perfectly impenetrable solution, no company can...
What’s the Difference Between My Cyber Risk Score and My Credit Score?
There are two diffs everyone has a credit score and absolutely no one understands what makes up their credit score. A cyber risk score is the exact opposite. Not every company has a cyber score or truly understands their cyber risk, but we can absolutely tell you what...
SOCs Need Automation to Win Against Growing Threats
Cyber threats have grown tremendously more sophisticated and with a global cyber talent shortage and rising costs automation is the only key to a successful SOC. Security Operations Centers (SOCs) play a critical role in helping companies of all sizes strive to...
Agile1 Is Now AgileBlue
Agile1 is now AgileBlue. This is an exciting change that marks the first step in a series of new developments for our growing business. Why the name change? In an effort to ensure unique name recognition in a crowded cyber security field, our research identified a...
SolarWinds Breach Update
If you are an Agile1 customer (thank you) we have taken the necessary steps to ensure you are properly being monitored 24/7. While no platform is guaranteed to stop a motivated and well-funded nation-state from a breach, working with the Agile1 SOC-as-a-Service can...