Posted in SEO

Is Google moving towards greater search equity?

30-second summary: Search equity allows for your average business owner to compete on the SERP without being impeded by a lack of SEO-knowledge A more…

Continue Reading... Is Google moving towards greater search equity?
Posted in SEO

Win a Free 30 Minute Talk With Me Session

I’m offering a lucky winner to book a free 30-minute talk-with-me session! We’ll talk about anything you want for thirty minutes related to marketing your…

Continue Reading... Win a Free 30 Minute Talk With Me Session
Posted in SEO

Mobile Marketing

Mobile marketing isn’t something that people take into consideration much when getting involved with the hyperlocal search, but it should be recognized because it’s probably…

Continue Reading... Mobile Marketing
Posted in More

The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good This week’s good news is a string of convictions displaying law enforcement and the legal system’s determination to fight cybercrime. A Cypriot national…

Continue Reading... The Good, the Bad and the Ugly in Cybersecurity – Week 12
Posted in More

Supercharge Your SOC With an Automated Approach to Incident Response

How do you shoot down a missile before it hits its target? That’s the problem facing today’s incident response teams. As cyberattacks increase in volume…

Continue Reading... Supercharge Your SOC With an Automated Approach to Incident Response
Posted in More

Stopping SolarWinds Breach with Jared Phipps

Listen to SentinelOne’s senior VP of Worldwide Sales and Engineering, Jared Phipps, talk to FUTRtech’s Chris Brandt about how SentinelOne successfully defended enterprises against the…

Continue Reading... Stopping SolarWinds Breach with Jared Phipps
Posted in More

Feature Spotlight: ML Device Fingerprinting with Singularity Ranger®

Knowing what is on your network is fundamental to securing your IT infrastructure. A single compromised device gives adversaries a foothold from which they can…

Continue Reading... Feature Spotlight: ML Device Fingerprinting with Singularity Ranger®
Posted in More

The Good, the Bad and the Ugly in Cybersecurity – Week 10

The Good Are cyberattacks on cyberattackers (aka ‘hacking back’) good news or bad news? While that question elicits mixed responses among security professionals, we can’t…

Continue Reading... The Good, the Bad and the Ugly in Cybersecurity – Week 10
Posted in More

Hiding Among Friends | How To Beat The New Breed of Supply Chain Attacks

If there’s any good to come out of the recent FireEye/SolarWinds breach, it may just be a long-overdue focus of attention on the risk to…

Continue Reading... Hiding Among Friends | How To Beat The New Breed of Supply Chain Attacks
Posted in More

The Good, the Bad and the Ugly in Cybersecurity – Week 11

The Good It seems as though we have been on a roll the last few months with notable cybercrime arrests. This week, South Korean police…

Continue Reading... The Good, the Bad and the Ugly in Cybersecurity – Week 11
Posted in More

Feature Spotlight: Fully Custom Role-Based Access Control

We are delighted to announce the next step in SentinelOne’s role-based access control (RBAC) capability: supporting fully custom roles. After collecting customer feedback for this…

Continue Reading... Feature Spotlight: Fully Custom Role-Based Access Control
Posted in More

Introducing Hack Chat, An Interview Series Hosted By Marco Figueroa

Hack Chat is a series of live conversations featuring real-life Red Team and Blue Team community leaders who are transforming the industry. For the past…

Continue Reading... Introducing Hack Chat, An Interview Series Hosted By Marco Figueroa
Posted in More

The Good, the Bad and the Ugly in Cybersecurity – Week 7

The Good Eight members of a SIM-swapping gang that targeted thousands of U.S. individuals during 2020, including hundreds of social media celebs, musicians and sport…

Continue Reading... The Good, the Bad and the Ugly in Cybersecurity – Week 7
Posted in More

To Be Continued…How End Of Life Products Put Enterprises At Risk

The software stack used by enterprises can be an excessive one, comprised of legacy software, commercial enterprise software, open-source software and a mixture of on-premise…

Continue Reading... To Be Continued…How End Of Life Products Put Enterprises At Risk
Posted in More

The Good, the Bad and the Ugly in Cybersecurity – Week 8

The Good This week was another successful week with regards to law enforcement operations against ransomware actors. Early in the week, news broke regarding the…

Continue Reading... The Good, the Bad and the Ugly in Cybersecurity – Week 8
Posted in More

5 Things You Need to Know About Silver Sparrow

Researchers at Red Canary recently broke news of a novel macOS infection dubbed Silver Sparrow. Given headlines that suggest this is a new malware threat…

Continue Reading... 5 Things You Need to Know About Silver Sparrow