Security On-Demand Received Top #21 Global Ranking in the 2022 MSP501 List. See the list here

Nautic Partners Announces the Formation of Advanced Threat Response Holdings, Inc. and the Acquisition of Security On-Demand

Nautic Partners Announces the Formation of Advanced Threat Response Holdings, Inc. and the Acquisition of Security On-Demand

Nautic Partners, LLC (“Nautic”) is pleased to announce the formation of Advanced Threat Response Holdings Inc., (“ATR”). ATR’s mission is to become a national leader in cyber security solutions that are specifically tailored to customers

Read More
The Problem with False Positive Alerts

The Problem with False Positive Alerts

The Problem with False Positive Alerts False positive alerts cost enterprises an average of $1.3M annually. Beyond financial loss, a recent study found that nearly half of all cybersecurity alerts are false positives, and 75%

Read More
What is AQ Technology?

What is AQ Technology?

What is AQ Technology? AQ Technology is found in Security On-Demand's ThreatWatch detection & analytics platform. How does AQ Technology make a difference in our threat detection tool? Well, AQ solves the Data Access problem

Read More
UPDATED FLASH ALERT: Apache Log4shell Remote Code Execution Vulnerability

UPDATED FLASH ALERT: Apache Log4shell Remote Code Execution Vulnerability

Updated Information to Apache Log4shell Remote Code Execution Vulnerability Event Summary Security On-Demand’s Threat Recon Unit continues to track the development of the log4shell vulnerability present in log4j, a nearly ubiquitous Java logging utility present

Read More
Nobelium Activity Targets Government and Business Entities

Nobelium Activity Targets Government and Business Entities

Events Summary Researchers at Mandiant are tracking a suspected Russian campaign targeting government and business entities around the globe. Mandiant reports that the activity is plausibly linked to Nobelium (APT29/Cozy Bear), the group behind the

Read More
How to Defend Against Denial of Service (DoS/DDoS) Attacks

How to Defend Against Denial of Service (DoS/DDoS) Attacks

There have been several recent reports regarding “Distributed Denial of Service” Attacks, which are also known as “DoS” or “DDoS” attacks. There were 972,000 DDoS attacks in January alone, which is higher than any other

Read More
PREV NEXT

What is AQ Technology?

What is AQ Technology? AQ Technology is found in Security On-Demand’s ThreatWatch detection & analytics platform. How does AQ Technology make a difference in our

Read More »

Latest News

Sign-up to Receive Threat Flash Alerts & Advisories