Podcast
Crayon Cyber Chat: The Journey to Cyber Resilience
Cybersecurity experts from Crayon, SMX and Red Sift cover the realities of the complex threat landscape and how partners can respond.
Partners, get your Bond on! Our Cyber Operatives Field Guide breaks down five cybersecurity missions to foil would-be cybercriminals.
Much like the high-stakes world of international superspies, modern businesses must navigate a landscape rife with digital threats that can spell disaster.
To truly master the cyber domain requires more than just cutting-edge technology. You’ll need strategies that ensure you can bounce back in the face of persistent attack types. Resilience is your best response.
Our latest eBook ‘The Cyber Operatives Field Guide’ offers detailed hypothetical attack briefings drawn from real world events to help you identify and counter common scenarios across data, identity, endpoints, and cloud platforms.
You’ll meet a host of devious archetypes and learn how partners and their customers can unite to combat them at every turn. Each mission breaks down the techniques, tools and practices of attackers, along with response parameters for partners and customers and the must-haves to include in every technical go-bag.
PLUS: a raft of quotes and references to the best of the best in the crime fighting world. See how many you can spot!
Here’s a sneak peek at what each mission entails:
Cyber adversaries often rely on social reconnaissance and pretexting to manipulate employees into unwittingly divulging sensitive information. Find out how cool-as-ice Izzy Salander weeds out an invasive element that’s using open-source intelligence to craft convincing personas and run spear-phishing attempts.
A hacker for hire that never sleeps, exists on Red Bull, chocolate-coated coffee beans and the thrill of illicit financial gain has cracked open an LDAP server. Unauthorised access to a treasure trove of organisational data is within his grasp. Will Miracle Max uncover the exploit and foil this threat actor?
From public charging stations to attempting to exploit MSP environments to tunnel through to customers, endpoints are prime targets for malware and ransomware attacks. In this mission, our agents are up against the coordinated efforts of a state-sponsored hacking group and must stop them from exfiltrating and ransoming high-value intellectual property via a software supply chain attack.
A devious threat actor has launched a Magecart attack to target e-commerce platforms and web browsers, targeting $32 million in payment transactions. Effective Level 3 resilience parameters will be needed to deny this crook a huge payload.
A poor cybersecurity culture leaves a back door open to malicious outsiders who will take advantage of any opportunity to find your weakest link. Human behaviour has the potential to render even the most comprehensive cyber resilience strategy worthless. Find out how to help your customers make every employee an allied agent in the cybersecurity mission.
These missions, should you choose to accept them, can help you learn to take on cybersecurity threats with the finesse of the best technical wizards in Q branch.
Good luck and remember… building true operational and cyber-resilience is your best response.
Podcast
Cybersecurity experts from Crayon, SMX and Red Sift cover the realities of the complex threat landscape and how partners can respond.
Company Announcements
Blogs
Insights on the direction of SMB cloud adoptions across the region, and the capabilities they most value in their technology service providers.
Training
How to ensure your Microsoft Partner Network (MPN) details are registered correctly against your customer’s cloud environments.
Blogs
An explosion in ransomware attacks has fueled a nationwide review of the issue, as concern rises that secret payoffs add increased fuel to the cybercrime fire.
Press Release
Company Announcements
Press Release
Empowering Partners, MSPs and ISVs with best-in-class protective DNS security solutions
Top 5 most common problems low-code solves for SMBs, what the low-code revenue growth potential for MSPs is, and why now is the time for MSPs to enter the low-code market.
Our latest Cloud Horizons eBook looks at a robust review of cloud tech's past, present, and future, value generation insights, and pathways to cloud profit for MSP’s.
Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.