American Technology Services

Find me on:

Recent Posts

SIEM: Security Information & Event Management

SIEM: Security Information & Event Management

A Breakdown for Executives


How to Build a Healthy Cybersecurity Culture in Your Organization

How to Build a Healthy Cybersecurity Culture in Your Organization

Organizations may encounter culture-building problems differently due to factors such as location, sector, and size. All organizations, regardless of.


5 Steps to Protect Your Company from Cyber Threats

5 Steps to Protect Your Company from Cyber Threats

1.    Implement Strong Security Measures

When it comes to protecting your business from cyber threats, employ a people-centric security approach..


MSP vs MSSP

MSP vs MSSP

There is some very understandable confusion between an MSP and an MSSP, but we’re here to help. While the names Managed Services Provider and Managed.


The Evolution of Esports

The Evolution of Esports


Managed Security Services Ultimate Guide

Managed Security Services Ultimate Guide

What is a Managed Security Services Provider (MSSP)?

An MSSP is a specialized cyber security team that provides outsourced monitoring and management.


How to Future Proof Your Information Security Strategy with PenTesting

How to Future Proof Your Information Security Strategy with PenTesting

What cyberthreats will your organization face in the next few years? Can you protect your business’s critical data? Do you know what would happen if.


An Introduction to the NIST Cybersecurity Framework

An Introduction to the NIST Cybersecurity Framework

What is the NIST Cybersecurity Framework?

The Cybersecurity Enhancement Act of 2014 amended the role of the National Institute of Standards and.


Evolving Threats and Standards for Defense Contractors: An Introduction to CMMC 2.0

Evolving Threats and Standards for Defense Contractors: An Introduction to CMMC 2.0

The Pentagon is encouraging defense contractors to adhere to the new cybersecurity practices illustrated by the National Institute of Standards and.


TDR, NDR, ETD, EDR: Concepts of Threat Detection and Response

TDR, NDR, ETD, EDR: Concepts of Threat Detection and Response

What is Threat Detection and Response (TDR)?

Threat Detection and Response (TDR) is the practice of deep analysis of security ecosystems to identify.


Content not found