Learn

ESG and DeepSeas MDR eBook for Midsize Companies

eBook: Managed Detection & Response for Midsize Organizations

How can a Managed Detection & Response solution serving midsize organizations effectively mitigate and manage cyber risk as the use of connected technology accelerates and the cyber threat landscape becomes more prolific and complex? In this eBook, Dave Gruber, a Principal Analyst at ESG covering threat detection and response, worked

Read More
Latest Cyber Threat Intelligence Report

Cyber Threat Intelligence Report – July 2023

The DeepSeas crew recently published their cyber threat intelligence report. As a client of DeepSeas, you can have the earliest access to these vital reports before they are published, as well as customized cyber threat intelligence reports tailored to your specific needs. Schedule a virtual consultation with the  DeepSeas threat

Read More

Active Exploitation of Unpatched Citrix Devices

On 18 July 2023, Citrix issued an advisory stating that a Remote Code Execution (RCE) vulnerability in older installations of NettScaler ADC was being actively exploited in the wild. The RCE vulnerability was assigned CVE-2023-3519 with a CVSS severity score of 9.8. There were 2 additional CVEs disclosed in the

Read More
DeepSeas Thought Leadership Service Hijacking Nuances

Service Hijacking Nuances

Let’s do a deeper dive into the nuances of service hijacking  – specifically the two primary variations of the technique and practical insights on how to detect them. The aim here is to equip you with the knowledge needed to identify these stealthy attacks and fortify your defenses. Awareness and knowledge

Read More
IT security vs Cyber security MSP vs. MDR

IT Security vs. CyberSecurity: How Your MSP & MDR Work Together

Should there be a battle or beneficial collaboration when it comes to IT Security vs. CyberSecurity? Understanding and leveraging the distinct capabilities of your Managed Service Provider (MSP) and Managed Detection & Response (MDR) solution is vital for your organization, as it helps you have a better grasp on your

Read More
OT Vulnerability Management with DeepSeas

OT Vulnerability Management: A Beginners Guide to Network Defense, Change Management, and System Hardening

Let’s dive into OT vulnerability management. Given the recent surge in ransomware attacks, especially those targeting obsolete Windows operating systems, it’s time rethink mitigation strategies. Fighting cybersecurity battles isn’t about patching vulnerabilities as they arise, but more about seeing the wider scope – understanding the probability and consequences, making smart

Read More
DeepSeas Cyber Defender's View of IT/OT Convergence

IT/OT Convergence: Perils, Promise & Your Best Defense Strategy

Welcome, cyber defenders, to an era where the boundaries between Information Technology (IT) and Operational Technology (OT) are no longer rigid. Our industrial landscape is evolving, and, as we navigate this transformation, we find IT/OT convergence before us. The convergence of these two realms, once disparate, has brought a new

Read More

Meet CyberSecurity Professional Services Expert, Tina Smith

As part of a series called “Meet our Deeps,” we introduce you to Tina Smith, a cybersecurity professional services expert at DeepSeas. Let’s dive in to learn more about Tina’s work and career. Hi, Tina. Can you tell us about your current role at DeepSeas and what attracted you to it?

Read More

Join our Team

21% of the DeepSeas crew are Veterans or Active Military Reservists. Join our talented crew of cyber experts.

The DeepSeas are calling. Schedule your virtual consult.

You pick the time and day. We'll be ready to answer your questions.