Insights

Cybersecurity information, thoughts and opinions you can actually use.

Blog

Providing insight, opinion and information to help define the problem, determine the solution and understand the cybersecurity landscape.

CIS Control #19: Incident Response and Management

CIS Control #19: Incident Response and Management

3:35 min read | Implementing all the CIS controls won’t guarantee there will never be a successful attack on your systems. Sooner or later, someone could penetrate defenses and access confidential information or deposit malware. To be prepared, you need an incident...

read more
CIS Control #18: Application Software Security

CIS Control #18: Application Software Security

3:35 min read | Flaws in software can leave your information systems vulnerable to attacks. Information about bugs in popular commercial and open-source software is available to everyone. Attackers exploit them once they're known, so keeping up with patch releases is...

read more

Corporate News

What’s going on with Anchor? These postings will give you a sense of what is happening with the organization, our team and give you a sense of our culture.

Anchor listed on the 2018 CRN Tech Elite 250

Anchor listed on the 2018 CRN Tech Elite 250

CRN's annual Tech Elite 250 list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading IT vendors. Continued training and education are critical not only to provide...

read more

Upcoming Events

Anchor hosts numerous activities and events every year to grow the cybersecurity community, educate our clients and friends. Stay tuned here for what’s coming up.

ASAE The Center for Association Leadership

ASAE The Center for Association Leadership

Improve Your Cybersecurity: Protect Your Members’ Data July 19, 2018 | 2:00-3:00 pm | Session Three Online Seminar Hear Anchor Technologies President & CEO, Peter Dietrich, discuss  how to protect your members’ information with effective and legally compliant data...

read more

Join Our Newsletter

True cybersecurity is a journey. Threats and vulnerabilities are ever evolving. Define your strategy, identify your risk, and manage that risk today — before its to late.