Knowledge Center

Gap & Readiness Assessments
DOWNLOAD NOW
Policy & Documentation Development
DOWNLOAD NOW
Managed Extended Detection & Response
DOWNLOAD NOW
Purple Team Case Study
DOWNLOAD NOW
Avalon Cyber Brochure
DOWNLOAD NOW
Tabletop Exercise Case Study
DOWNLOAD NOW
Penetration Testing Services
DOWNLOAD NOW
MDR Cybersecurity Service Plans
DOWNLOAD NOW
Turning the Tables on Cyber Breaches
DOWNLOAD NOW
vCISO Services
DOWNLOAD NOW
7 Ways Employees Put Corporate Data at Risk
DOWNLOAD
2022 Ransomware Report
DOWNLOAD NOW
Microsoft 365 Best Practices Security Assessment
DOWNLOAD NOW
2022 Phishing Report
DOWNLOAD NOW
Security Advisory Services
DOWNLOAD NOW
Incident Response Retainer Services
DOWNLOAD NOW
A Guide to NYS SHIELD Compliance
DOWNLOAD
Cybersecurity Maturity Model Certification (CMMC) Services
DOWNLOAD NOW
Log4j Vulnerability Information
DOWNLOAD NOW
Lockbit 2.0 Ransomware Infographic
GET THE INFOGRAPHIC
When Assumptions Aren’t Enough: The Future of Cyber Risk
WATCH THE VIDEO
Remote Desktop Protocol (RDP) Attacks
DOWNLOAD
The Argument for Opensource SIEMs
LEARN MORE
KnightVision CAM: Compliance, Alerting, Monitoring
Download
Case Study: Incident Response – Cybercriminal Attempts to Execute a Ransomware Attack on Christmas Day
DOWNLOAD
Case Study: Incident Response – Cybercriminal Nearly Gains Access Through Third-Party App
DOWNLOAD
Incident Response- How Hackers Attack
Download
Video – Using Threat Intelligence for Cyber Incident Response Investigations
WATCH THE VIDEO
Cybersecurity Risks with Corporate Mergers and Acquisitions
WATCH THE VIDEO
Healthcare is a Top Three Target for Hackers and Organized Crime Groups
WATCH THE VIDEO
Law Firms are a Primary Target
WATCH THE VIDEO
KnightVision Showcase
WATCH THE VIDEO
Being Proactive vs. Reactive
WATCH THE VIDEO
Incident Response: Office365 Email Compromise
WATCH THE VIDEO
Incident Response: Email Phishing Attacks
WATCH THE VIDEO
Case Study: A Corporate Employee Steals Critical Data
WATCH THE VIDEO
Data Breaches – A Year at a Glance
DOWNLOAD
Incident Response and Forensic Investigation
WATCH THE VIDEO
Why You Need an EDR Solution
Watch the Video
Not Another Boring Research Report – Law Firm Cyber Security Trends
DOWNLOAD
Internal Investigations – Unauthorized Access to Digital Materials
DOWNLOAD
IP Theft – Former Employee Steals Company Data For New Employer
DOWNLOAD
Incident Response – Website Leaks Job Applications and Social Security Numbers
DOWNLOAD
6 Steps to a Successful Cybersecurity Strategy: For the Highly Targeted Law Firm
DOWNLOAD
11 Critical Questions To Ask Your IT Provider (Before It’s Too Late)
DOWNLOAD