Hear from Don on why the M87 is a team and services are the leader in the Managed Cyber Security Market and attracting customers from all around the world.
“We focus on providing answers rather just alerts – providing highly tailored solutions based on our customers security requirements” – Don Velinor
More posts like this
M87 - How is our VM program different
M87 - How is our VM program different
December 29, 2022
Are These Cybersecurity Challenges Undermining Its Effectiveness?
Are These Cybersecurity Challenges Undermining Its Effectiveness?
September 26, 2022
Top Use Cases for detecting Cyber Incidents.
Top Use Cases for detecting Cyber Incidents.
September 25, 2022
How does External Attack Surface Management augment Red teaming for organizations
How does External Attack Surface Management augment Red teaming for organizations
September 17, 2022
Unpacking the Cybersecurity Double Standard
Unpacking the Cybersecurity Double Standard
September 17, 2022
Secure your external facing assets - External Attack Surface Management by Horizon
Secure your external facing assets - External Attack Surface Management by Horizon
Four Pillars of BAS
Four Pillars of BAS
Complimentary Assessment - Ransomware Protection with M87 Cyber's Breach Attack Simulation
Complimentary Assessment - Ransomware Protection with M87 Cyber's Breach Attack Simulation
2022 Open Source Security and Risk Analysis (OSSRA) report by SYNOPSYS
2022 Open Source Security and Risk Analysis (OSSRA) report by SYNOPSYS
A day at ThinkLink
A day at ThinkLink
Inside M87 - Powered by Intelligence
Inside M87 - Powered by Intelligence
Introducing Cyber Hygiene Assessment -Nitish Hejmadi
Introducing Cyber Hygiene Assessment -Nitish Hejmadi
Cyber Hygiene Assessment
Cyber Hygiene Assessment
A Beginner's Guide to Cyber Risk Assessment: How to Determine the Level of Risk for Your Organization
A Beginner's Guide to Cyber Risk Assessment: How to Determine the Level of Risk for Your Organization
Auditing, Assessing, Analyzing: A Prioritized Approach using the Pareto Principle
Auditing, Assessing, Analyzing: A Prioritized Approach using the Pareto Principle
How To Conduct A Cyber-Risk Assessment That Is Proactive vs. Reactive
How To Conduct A Cyber-Risk Assessment That Is Proactive vs. Reactive
Qualitative Vs Quantitative Risk assessment
Qualitative Vs Quantitative Risk assessment
5 Ways to Improve Your Cyber Hygiene: Why It Matters, and How to Do It!
5 Ways to Improve Your Cyber Hygiene: Why It Matters, and How to Do It!
Playbook for Threat Modeling Medical Devices
Playbook for Threat Modeling Medical Devices
Playing Offence: Using Ransomware Assessments to Power a More Proactive Security Strategy
Playing Offence: Using Ransomware Assessments to Power a More Proactive Security Strategy
How Breach & Attack Simulation Tools Can Help You Prepare for Ransomware Attacks
How Breach & Attack Simulation Tools Can Help You Prepare for Ransomware Attacks
A Complimentary Assessment Based on Real-World Attacks
A Complimentary Assessment Based on Real-World Attacks
Team Spotlight: Don Velinor Co-Founder & VP of Sales
Team Spotlight: Don Velinor Co-Founder & VP of Sales
Team Spotlight: Nitish Hejmadi CEO and Founder
Team Spotlight: Nitish Hejmadi CEO and Founder