Articles

Stay up-to-date on the latest IT trends and best practices with ATS’ informative articles. Browse our library of articles and enhance your IT knowledge today.

TDR, NDR, ETD, EDR: Concepts of Threat Detection and Response

What is Threat Detection and Response (TDR)? Threat Detection and Response (TDR) is the practice of deep analysis of security ecosystems to identify bad actors or irregular behaviors that could lead to compromises on the network. TDR helps Managed Security Service Providers (MSSPs) and Security Operation Centers (SOC) teams detect malicious network activity and stop […]

The Keys to CMMC Compliance

The Department of Defense (DOD) has published a new set of cybersecurity requirements for doing business with the Department: The Cybersecurity Maturity Model Certification (CMMC). By 1 October 2025, every DOD contractor will be required to obtain a CMMC certification. CMMC compliance is critical to DoD contractors, but the CMMC compliance process can be complex

Cloud & Mirrors

The term cloud computing is appearing more and more frequently in the press and advertising. The idea of the cloud has floated beyond trade media and appears frequently in mainstream publications. The inferred definition of the cloud, pieced together by the context of these appearances, isn’t very clear. One might say that the exact definition

A Virtual Twist for Managed Hosting Services

Credit unions are hosting their websites on Virtual Private Servers. Does your credit union know the benefits of a managed hosting environment? How is your credit union hosting its website – shared, collocated, or dedicated? What if you can get a well-managed hosting solution that has the benefits of all three – the cost effectiveness

Scroll to Top
Skip to content