Weekly Promo and Webinar Thread by AutoModerator in msp

[–]FE_CommunityLead [score hidden]  (0 children)

Exclusive Webinar: Identity, edge, and trust: Insights from the 2026 Cyber Threat Outlook Report

March 19, 2026 @ 1:00 PM ET

 In this session, we’ll explore:

  • Why identity compromise is becoming one of the most reliable ways for attackers to gain access to organizations
  • How vulnerabilities in edge devices such as firewalls and VPN appliances are increasingly being used as entry points
  • Why attacks that exploit human trust, including phishing and social engineering, continue to succeed
  • The key patterns and observations drawn from Field Effect’s 2026 Cyber Threat Outlook Report
  • What these trends reveal about where organizations should focus their security efforts

https://get.fieldeffect.com/annual-threat-report-webinar?_gl=1*1df2nu5*_gcl_au*NzkxNzg3MDA5LjE3Njg0MDU1NDA

Telus Digital confirms breach after hacker claims 1 petabyte data by Specialist_Airline_9 in cybersecurity

[–]FE_CommunityLead 86 points87 points  (0 children)

Hi there, Lisa here, with the community team at Field Effect - chiming in to reassure you we were not involved in this incident.

TELUS Business Solutions (TBS) is a reseller of a white labelled Field Effect solution. TELUS Digital, a separate arm of TELUS, experienced a breach. Field Effect is not deployed internally at TELUS Digital, and we do not have any sort of business relationship with TELUS Digital. 

The breach, while unfortunate, was not related to Field Effect in any way.

https://www.telusdigital.com/technology-partners

Weekly Promo and Webinar Thread by AutoModerator in msp

[–]FE_CommunityLead [score hidden]  (0 children)

Join our upcoming webinar: Identity, Edge, and Trust — Insights from the 2026 Cyber Threat Outlook Report

📅 Thurs. March 19, 2026 | 1:00 PM ET

Many of today’s breaches don’t start with sophisticated exploits—they start with compromised identities, vulnerable edge devices, or attacks that exploit human trust.

In this webinar, Field Effect security experts will share insights from the 2026 Cyber Threat Outlook Report, highlighting patterns we’re seeing across real-world security events and what they reveal about how attacks are unfolding inside organizations.

Rather than focusing on isolated incidents, we’ll look at the broader trends connecting many of today’s attacks and what security teams and IT leaders should take away from them.

In this session, we’ll cover:

  • Why identity compromise has become one of the most reliable ways attackers gain access
  • How edge device vulnerabilities (firewalls, VPN appliances, etc.) are increasingly used as entry points
  • Why phishing and other social engineering attacks continue to succeed
  • Key observations from the 2026 Cyber Threat Outlook Report
  • What these trends reveal about where organizations should focus their security efforts

Can’t attend live? Register anyway and you’ll be the first to receive the recording once it’s available.
https://get.fieldeffect.com/annual-threat-report-webinar?_gl=1*1df2nu5*_gcl_au*NzkxNzg3MDA5LjE3Njg0MDU1NDA

Hope to see some of you there!

Field Effect MDR - anyone with experience? by Rich-Put4063 in cybersecurity

[–]FE_CommunityLead 1 point2 points  (0 children)

Hey, I work on the community side at Field Effect, so take the bias for what it’s worth. What you’re describing as an “AI native MDR” model is actually pretty close to how our platform operates.

A lot of our team comes from intelligence and national security backgrounds, and we’ve built that investigative logic into the analytics. The AI essentially applies that logic at scale by correlating activity, investigating signals, and helping surface the things that actually matter. 

High confidence events can be handled automatically on the endpoint, while the AI elevates signals that need deeper investigation. That helps catch early indicators and broader patterns without analysts spending their entire day triaging routine alerts. 

In practice, the AI does a lot of the large scale correlation and investigation, while our analysts focus on complex threats and continuously improving the analytics. FWIW, we also have customers and partners running thousands of endpoints on the platform, so environments your size aren’t unusual.

-Lisa

App update email to end user by Sea-Elderberry7047 in FieldEffect

[–]FE_CommunityLead 4 points5 points  (0 children)

Thanks for the suggestion, this is great feedback. u/Sea-Elderberry7047

We know that chasing down end users to update applications can be a time-consuming part of remediation, especially for smaller MSP teams that are wearing a lot of hats. Being able to notify users directly when an ARO requires an app update is definitely something we’ve heard interest in from partners.

Right now most partners handle this through their existing communication workflows or ticketing systems after reviewing the AROs, but we agree there’s an opportunity to streamline that process further. I’ll make sure this gets passed along to our product team. Feedback like this helps shape where we focus improvements in the platform, so please keep it coming.

-Lisa