We're pumped to announce a partnership with PowerPSA Consulting and its community of vCISO, MSSP, and MSP leaders. Shoutout to Jesse Miller and his team for their thought-leadership in the cybersecurity space ??
Shield
计算机和网络安全
Indianapolis,IN 630 ä½å…³æ³¨è€…
Proactive cybersecurity based on logic, not magic.
关于我们
Shield Cyber is a continuous exposure management platform. Built by penetration testers, Shield is designed to detect and prioritize exposures from the perspective of an attacker with a heavy-focus on Identity Security. Head to shieldcyber.io to see what we mean.
- 网站
-
https://shieldcyber.io
Shield的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 2-10 人
- 总部
- Indianapolis,IN
- 类型
- ç§äººæŒè‚¡
地点
-
主è¦
US,IN,Indianapolis
Shield员工
动æ€
-
We're excited to attend #MSPSummit and #CPExpo next week in Vegas?? Got questions on building a strong MSP/MSSP vulnerability management program? Want to know how attackers are using Active Directory in 2025? Comment below, message Teddy Guzek, Luke Hacherl, or Dylan Hutchison, or flag us down at the conference to chat!
-
-
Dylan Hutchison and Luke Hacherl are heading up to Chicago next week to talk all things channel, cybersecurity, vulnerability management, and identity security. Let us know if you're going!
The GTIA Communities & Councils Forum is open to highly engaged members and those new to the GTIA community. It's a great way to meet peers and engage with your trade association. Registration, agenda and more information links are in the comments. #WeAreGTIA
-
-
Alright fine...we'll do the in/out 2025 trend to keep up with the cool kids... ?? What’s in? Continuous risk prioritization based on "least amount of effort to have the biggest impact" ? What’s out? Treating every vulnerability as "Critical.†?? What’s in? Protecting Active Directory as a critical asset. ? What’s out? Thinking AD security is "...just an IT problem." ?? What’s in? Helping MSSPs/MSPs sell "new logo" business using your software ? What’s out? Treating partners as "users" and not helping them with THEIR business goals ?? What’s in? Free assessments that deliver immediate insights (like our AD assessment that takes 5-min to deploy??). ? What’s out? Gating value behind long-term contracts or with large $ commitments
-
Traditional Vulnerability Management is BROKEN for MSPs/MSSPs... Luke Hacherl dives into how we fix that at Shield
-
If this post gets one "Like" we'll make Teddy Guzek send a gift card for breakfast to any and all SOC Managers/Directors who are open for a quick conversation on Identity.
Calling all SOC Managers and SOC Directors! Are you open to a conversation about your stack, specifically as it pertains to identity? No sales pitch—this is strictly for research! I just want to ask questions and listen. We’ve already gathered some amazing insights but are looking to dive even deeper to understand the challenges and tools in play when it comes to managing identity in the SOC. Your input would be invaluable, and I’d love the opportunity to hear about what’s working (and what’s not) in your current stack. If you’re open to a quick chat, drop me a message Special thanks Joe Morin, Jacob Bice, Dustin Hutchison, PhD, Joshua Copeland, Jeff Hill-MBA who have added invaluable input and introductions so far.
-
Chat with us and we'll send you the playbook/tools to see how your "Identity layer" is configured ??♂?
Your business’s biggest cybersecurity threats come down to one thing: identity permissions. Most cyber-attacks happen when malicious actors exploit existing identity permissions, but there are a few simple things you can do to protect your organization. Here are my top three:
-
It’s time to think about vulnerability management a little bit differently. Attackers aren’t only focused on exploiting CVEs…
Traditional vulnerability management focuses on initial access points, but what happens next in the attack lifecycle? We've all heard the phrase, "???????? ?????????????? ???????? ???? ????? ??????????????, ????'?? ???????? ????????." But what if I told you it doesn’t have to be? No matter how an malicious actor gets in—whether through phishing, exploiting a vulnerability, or another method—the real question is: What do they do next? Malicious actors don’t continue exploiting vulnerabilities as they move through an environment. It’s too noisy and takes too long. Even a poorly configured EDR could catch them. Instead, attackers often "drop" to the identity layer and move quietly. This hidden identity layer, typically Active Directory or EntraID (AzureAD), becomes the highway for lateral movement. It’s how ransomware and other threats propagate across networks. But this can be avoided. A properly configured identity layer can stop an attacker in their tracks, shutting them down before they can move laterally. Now, imagine a solution that tracks vulnerabilities and misconfigurations across the entire attack lifecycle, pinpointing exactly how an attacker could move through your environment without creating extra noise. #exposuremanagement #identitysecurity #vulnerabilitymanagement
-
Shield转å‘了
Yes, even we at Shield have role models and Huntress is number one on that list for me. Being a great cybersecurity product is one thing, but creating a partner-first attitude and approach is something we've been doing from day one. To the Redditor that gave us this shoutout and very kind words, we appreciate you more than you know!
-