Our Thinking

Ascent Solutions provides best-in-class cybersecurity services to solve business problems. We aim to share our knowledge with people who are as passionate about saving the world as we are.
Our Stewards bring special forces intellect and industry knowledge to your cybersecurity enterprise, so you receive focused, relevant solutions to your toughest problems from the best partners in the cybersecurity space.
White Paper
Download our latest white paper: Five Cybersecurity Trends for 2024
Ready to see the future? Explore Ascent's 2024 cyber predictions.
content
White Paper
Five Cybersecurity Trends for 2024

Ready for lift off? Explore Ascent’s 2024 cyber predictions.

content
Blog
Right-sized Security: Choosing Managed Services for Your Business

April 17, 2024 – Managed security is cost effective, but sometimes the range of services offered feels overwhelming. Read on for a right-sized approach.

content
eBOOK
Enable Secure, Compliant, and Responsible AI Adoption

March 16, 2024 – Microsoft Copilot for Security is at the forefront of a Gen AI-driven revolution in cybersecurity. Here’s what to consider before adopting:

content
Blog
3 Questions to Ask Before Consolidating Your Security Stack

March 26, 2024 – Security teams can improve the economics of their security strategy in two ways: tool costs and employee time. Platform consolidation addresses both.

content
News
Ascent Solutions Recognized as a Microsoft Security Excellence Awards Finalist for Security Customer Champion

March 12, 2024 – Ascent Solutions announced it is a Security Customer Champion award finalist in the Microsoft Security Excellence Awards.

content
Blog
Why Purdue Model Level 0 Is the Most Important to Secure

February 6, 2024 – If you had to divide a business into operating layers and prioritize by importance, how would you do it? Cybersecurity strategy must rank which risk is most likely to topple a business’ continuity.

content
Blog
Enabling Microsoft Security Copilot

December 19, 2023 – Security Copilot is Microsoft’s generative AI complement to its unified security platform. Here’s how to plan a security-aware implementation.

content
Blog
How to Respond to the United States AI Executive Order

December 12, 2023 – How should businesses respond to the United States’ AI Executive Order?

content
Blog
Target Your Security Controls: How to Engineer Good Detections

December 5, 2023 – Detection engineering calibrates security controls so the SOC team can tackle the right threats the right way.

content
Press Release
Ascent Solutions is a proud participant in the Microsoft Security Copilot Partner Private Preview

November 16, 2023 — Ascent Solutions today announced its participation in the Microsoft Security Copilot Partner Private Preview.

content
Blog
4 Ways to Secure Operational Technology and Critical Infrastructure

October 16, 2023 – Many businesses with operational technology (OT) are vulnerable to single-point-of-failure attacks. So how should OT security teams protect against IoT vulnerabilities and threat actors?

content
Press Release
Ascent Solutions Announces Technology Industry Veteran Pete Fox as President

October 10, 2023 — Today, Ascent Solutions, a leading cybersecurity firm and top Microsoft partner in consulting and managed security services, announced the return of industry executive Pete Fox as President.

content
Blog
How to Defend Against AI Threats with MITRE ATT&CK ATLAS

September 26, 2023 – New technology equals new attack vectors. We’d recommend using MITRE ATT&CK ATLAS to understand how an adversary can take advantage of the gaps in AI, ML, and LLMs.

content
Blog
Why Every Security Team Needs Eyes on the Dark Web

September 19, 2023 – Does your organization monitor the clear, dark, and deep web for threat actor activity? Here’s why you should.

content
Blog
Why Threat Intelligence Should Inform Your Breach Response

September 12, 2023 – Monitoring ransomware victim pages for victims that are within your industry is a proactive action towards prevention.

content
Blog
Why Every CISO Needs an Incident Commander

August 29, 2023 – If you’re the hacked security team, it’s easy to imagine the nightmare situation that ensues and the questions swirling in your CISO’s mind.

content
Blog
7 Reasons to Monitor Your External Attack Surface

August 15, 2023 – Monitoring your external attack surface highlights where and how threat actors test your boundaries.

content
Blog
4 Keys to Cyber Investment: Speaking Your Board’s Language

August 8, 2023 – If a business doesn’t develop its operations with security in mind, implementing it later when the business is “big enough” necessitates breaking existing technology and building it back up with security controls.

content
Blog
Think Like a Threat Actor: Modernizing Your Endpoint Security

July 31, 2023 – Your business’ growth isn’t a turn off to attackers. It ups the ante. The more endpoints, or people, devices, and applications, to exploit, the greater the attack surface.

content
Blog
4 Reasons to Tackle Shadow IT Now (Not Later)

July 25, 2023 – Shadow IT is often an easier substitute for the outdated or clunky technology the company officially uses. But it’s also easier to breach.

content
Blog
Why Data Security is Essential to Your AI Strategy

July 18, 2023 – Tech gurus say AI, ML, and LLMs are revolutionary, the most significant disruptors of our time. But in another sense, AI is just the next tool.

content
Blog
Make Endpoint Security Simple: Why We Choose Microsoft Every Time

July 11, 2023 – Customers regularly ask us “Why Microsoft? Why Microsoft security? Isn’t it more expensive? Does Microsoft truly secure my organization?” Read on for a detailed guide.

content
Press Release
Ascent Solutions Recognized as Winner of 2023 Microsoft US Partner of the Year

June 28, 2023 — Ascent Solutions today announced it has won the Modern Endpoint Management 2023 Microsoft US Partner of the Year Award.

content
Blog
How to Analyze Cyber Threat Intelligence with ChatGPT

June 20, 2023 – Like many other security professionals, we are fascinated with the possibilities that GPT Large Language Models (LLMs) models create for security teams. But tools, software, and technologies have strengths, weaknesses, costs, benefits, and tradeoffs.

content
Article
Security for the Real World: 3 Zero Trust Architecture Examples

June 6, 2023 – These three Zero Trust architecture examples from a fictional company show how Zero Trust strategy benefits employees across the organization.

content
Blog
How to Investigate Code Intent with ChatGPT

May 23, 2023 – AI and other LLMs will never replace human ingenuity, but it can reduce complexity, reduce cost, and make your processes more secure.

content
Article
Identity and Devices: The Best Starting Pillars of Zero Trust

May 16, 2023 – Identity and devices are two of the most commonly discussed pillars because they are relevant starting points for nearly every organization.

content
Blog
Building AI and Machine Learning into Modern SOC Security

May 10, 2023 – Behind the scenes of these “chat” interfaces are models, some of which have been highly trained to understand code.

content
Blog
API Security Is a Growing Problem. Here’s How to Frame It.

April 28, 2023 — Unless you are a developer, you may never see the script backing an API. And when something is out of sight, it’s too often out of mind.

content
Press Release
Ascent Solutions Recognized as a Microsoft Security Excellence Awards Winner for Security Trailblazer

April 25, 2023 — Ascent Solutions wins Microsoft’s MISA Security Trailblazer Award.