Blogs and Resources

Quorum Cyber Continues Expansion in North America with Kivu Consulting Acquisition
Quorum Cyber, who acquired Difenda in September 2024, expands its Incident Response capabilities by adding digital forensics, business restoration, and ransom negotiations to its service catalogue with the acquisition of the U.S. based company. Quorum Cyber –...
Quorum Cyber Continues Expansion in North America with Kivu Consulting Acquisition
Quorum Cyber, who acquired Difenda in September 2024, expands its Incident Response capabilities by adding digital forensics, business restoration,...
Filter by

Does Your Company Have A Cybersecurity Strategy?
When considering that corporations are likely to face a data security breach at some point, it becomes imperative that your company be prepared with a cybersecurity strategy. It may seem like a vexing challenge when the digital world is in constant flux—with the...

Video: Difenda + Venafi: Machine Identities
https://vimeo.com/539847238

Threat Advisory: Critical Apache Log4j Vulnerability
About the Threat On December 9th, the most critical zero-day exploit in recent years was discovered affecting most of the biggest enterprise companies impacting the Apache Log4j Java-based logging library. This vulnerability is also known as...

Top Cybersecurity Management Questions Answered
Cybersecurity management may seem complicated and, let's face it, it often is. But even without a degree in computer science, there are several important steps and processes you should have in place to ensure your IT infrastructure is protected from intruders. You...

How to Perform Successful Penetration Testing
Business, technology, internet and networking concept. Young businesswoman working on his laptop in the office, select the icon security on the virtual display. What is Penetration Testing? Penetration testing is known as an assimilated hack to identify...

What is alert fatigue?
What is alert fatigue in cybersecurity? Security teams are responsible for protecting an organization's data and systems from Cyberattacks. To do this, they rely on security tools that generate alerts when suspicious activity is detected. However, too many alerts can...

Video: Difenda Advanced Vulnerability Management | AVM
https://vimeo.com/551513528

Difenda Joins Microsoft Intelligent Security Association
Cybersecurity Provider to Join “Vibrant Security Ecosystem Oakville, ON, November 10th, 2021 — SecOps-as-a-Service provider and cybersecurity consultancy Difenda announced today that it has joined the Microsoft Intelligent Security Association (MISA). As...

The Beginner’s Guide to Cybersecurity Risks
Does the thought of cybersecurity threats keep you up at night? From one-person consultancies to multinational corporations, every business is at risk of a cyber attack. That's why all organizations—regardless of industry or size—need to strengthen their...

Managed Extended Detection & Response (MXDR) Video
https://vimeo.com/539822934?embedded=true&source=video_title&owner=138416541 #MicrosoftMarketplaceMDR

Video: Difenda Fireside Chat 2 – Azure Sentinel
https://vimeo.com/567042016

Video: Difenda Fireside Chat – Azure Sentinel – Rod Trent & Manoj Arora
https://vimeo.com/549461282

Why Microsoft Is Now the Leader in Endpoint Detection
The cybersecurity industry is no stranger to assumptions. It's the reason why the same established technology providers have been the focus for over a decade. It's also the reason why Microsoft was historically overlooked as a reliable solution provider in this...

Difenda is Co-Sell Ready – Microsoft Azure Marketplace
Bucharest, Romania - November 27, 2019: View of Microsoft Romania headquarters in City Gate Towers situated in Free Press Square, in Bucharest, Romania. TORONTO- Difenda Inc., a leading global managed security services provider (MSSP), is pleased to announce that two...

Making the Case for the Consolidated Security Stack: A Quick Overview
Whether you work as a chief information security officer (CISO) or just a cybersecurity specialist at the IT department, you know the difficulty of maintaining a secure and efficient network for your business. Threats of breaches, hacks, and other risks are...

Are Apologies from Cyber Criminals Enough? Are we Prepared?
Angry business man talking on phone disputing looking at laptop, stressed frustrated office worker arguing by mobile solving online computer problem with technical support complaining on bad service (Angry business man talking on phone disputing looki Author: Derek...

Difenda Wins the ‘Great Place to Work’ Award
We're proud to announce that Difenda has officially won the ‘Great Place to Work‘ award this year. Our recent win of this award is an achievement our entire staff holds close to our hearts, as it highlights our efforts to be a culturally sound, innovative, and...

Difenda Named to MSSP Alert’s Top 250 MSSPs List for 2021
Fifth-Annual List Honors Leading MSSP, MDR and SOCaaS Cybersecurity Companies Worldwide MSSP Alert, published by After Nines Inc., has named Difenda to the Top 250 MSSPs list for 2021 (https://www.msspalert.com/top250). The list and research identify and...

Kaseya Ransomware Attack and the Implications of Microsoft Defender for Endpoint (MDE)
By now, the story of the Kaseya ransomware attack is a cautionary tale to all MSP's and their clients. However, there's more to the story than meets the eye. Let's first examine the role Kaseya played in the attack. The Problem: Kaseya VSA is an on-premise solution...

What is a Compliance Audit?
Performing a compliance audit is a way to prove that the organization is compliant with regulatory and international standards and also measure how the organization's operations are regulated, risk-balanced, measurable, and can be monitored. Based on the results of an...

Product Brief: MDR for OT

How to Ensure Your Information is Safe with End-to-End Encryption
Every day, we hear news about new security breaches of personal information, credit card information, and sensitive data that was stolen or disclosed because it wasn't encrypted in transit or at rest. In today's multi-device working environment it is imperative to...

The growing need for cybersecurity risk management
Cyber security IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB Every organization with a digital footprint is a target for cyber...

5 Steps to Improve Your Company’s IT Risk Management
Young Female Government Employee Wearing Glasses Uses Tablet in System Control Center. In the Background Her Coworkers are at Their Workspaces with many Displays Showing Valuable Data. Cybersecurity is a complicated issue, which can't be solved quickly. But as...

Why organizations are consolidating security
In recent years, there has been an increasing trend toward consolidated security solutions. Instead of relying on multiple disparate tools, organizations are now seeking to have a single platform that can provide comprehensive protection. There are several reasons for...

What is the CIA Triangle and Why is it Important for Cybersecurity Management?
Confidentiality, integrity, and availability, aka the CIA triangle, is a security model created to guide information security policies within a company. The three elements of the CIA triangle are considered to be the three most important components of security. ...

Cybersecurity Advisory: CISCO Smart Install (SMI) Vulnerability
C3 Threat Advisory Reference# 04162018-1 Cisco has acknowledged the misuse of the Smart Install protocol on its network access layer switches running the IOS and IOS XE software leading to reports of the affected devices being reloaded causing network downtimes....

Cybersecurity Advisory: Password Spraying Attacks
Malicious cyber actors are increasingly using a style of brute force attack known as password spraying attacks against organizations in the United States and elsewhere. Brute-force attacks traditionally attempt to gain unauthorized access to a user...