Cybersecurity Education
Discover hacker tradecraft, elevate your security expertise and have more
actionable client conversations. Watch webinars, download eBooks and more.
Download Huntress’ SMB Threat Report for insight into the latest adversary trends and behaviors, specifically tailored for SMBs.
DownloadG2, the world's top business software review platform, presents the Fall 2023 Small-Business EDR Grid® report in collaboration with Huntress, assisting businesses in making informed IT Infrastructure EDR technology choices.
Read MoreIntroducing Huntress MDR for Microsoft 365
Join the Huntress team for an on-demand demonstration and behind-the-scenes look at our newest service: Managed Detection and Response (MDR) for Microsoft 365.
WatchBattling Business Email Compromise with Huntress MDR for Microsoft 365
Discover the real-world impact of BEC attacks and how Huntress MDR for Microsoft 365 can shield businesses with expert threat detection and response.
Read NowCybersecurity Horror Stories
Discover spine-chilling real-world attack stories detected by Huntress in our on-demand Halloween special.
WatchThe Product Lab
November 28 | 1:00pm ET
Come hang out with the Huntress team for a behind-the-scenes view as we build and iterate through new products and features.
Back to School with Huntress Managed EDR
Sharpen your pencils and pack a lunch box—class is in session and it’s time to learn about Managed Endpoint Detection and Response (EDR).
Huntress Managed EDR Demo
Join us for a demo and see how Huntress Managed EDR can help you fight back against today’s threats and stay out of the headlines.
RegisterUnderstanding GDAP and It's Operational Impact
Very soon, Microsoft will start deprecating Delegated Admin Privileges (DAP), the one your team most likely uses, in favor of the new Granular Delegated Admin Privileges (GDAP).
Watch NowCyber Insurance Masterclass Series
The Cyber Insurance Masterclass webinar will deepen your understanding of cyber insurance from the service provider's perspective.
Watch NowThe True Value of People-Powered Cybersecurity
This white paper explores the realities of today's cyber challenges and how to overcome them with people-powered cybersecurity.
Read NowAssessing the State of Cybersecurity for Mid-Sized Businesses in 2023
Join our webinar to dive into the research, hear from experts as they discuss its trends and findings, and learn how you can get ahead and improve your own security posture.
Watch NowManaged Detection and Response for Microsoft 365
Cut through the noise to defend your Microsoft 365 environment.
Where Huntress Fits in Your Security Stack
Our platform aligns with the NIST Cybersecurity
Framework to keep you protected.
Evolving the Hunt in Australia & New Zealand: The latest from Huntress
Hackers are constantly evolving. We’ve seen this firsthand in Australia and New Zealand with a number of high profile breaches in recent months.
Watch NowThe Power of People: Inside Huntress EDR + 24x7 Operations
In this webinar, learn about the “magic” behind Huntress’ ThreatOps team. We’ll dive into real-world investigations and threats we’ve encountered.
Watch NowThe report, which surveyed 250+ IT professionals in mid-sized businesses found that many feel understaffed, under-resourced and unprepared to face today’s evolving threats.
Read MoreManaged EDR Live Demo
Join us for a demo and see how Huntress Managed EDR can help you fight back against today’s threats and stay out of the headlines.
Watch NowWhat Every MSP Should Know about Cyber Insurance
Andrew Meier of Huntress and Wes Spencer of FifthWall Solutions will dive deep into cyber insurance from a service provider’s perspective.
Watch NowPicking the right EDR solution just got easier. Here is your all-encompassing guide to EDR that suits your needs.
Read NowThere’s no denying the need to defend your devices from today’s bad actors. But what exactly is endpoint detection and response, and what role does it play in your security practice?
Watch NowEvolving the Hunt: Your Tour of Huntress 24/7 Managed EDR
Huntress delivers a powerful endpoint protection suite. This combination of detection and response capabilities wouldn’t be possible without our 24/7 threat hunting and host isolation.
Watch NowBuilding a Threat-Informed Security Program Using the Cyber Defense Matrix
Sounil Yu and Huntress' Garrett Gross discuss how to apply the Cyber Defense Matrix to your business.
Watch NowBack to Security Basics
Join our webinar to hear our panel of MSPs and experts as they discuss how they ensure good cyber hygiene.
Watch NowWebinar: Cybersecurity Chat with Huntress and Syncro
Join Ian Alexander of Syncro and Henry Washburn of Huntress in a lively conversation about the state of cybersecurity for the SMB.
Watch NowEDR in Action: Protecting Your Endpoints from Today's Cyber Threats
Join us for a hands-on webinar where our experts will expose common hacker tradecraft and showcase how managed EDR can catch attackers red-handed.
Watch NowWhat Have You Done for Me Lately: Communicating the Value of Cybersecurity in Your QBRs
Learn how to have meaningful QBRs that won’t leave clients wondering, “what have you done for me lately?”
Watch NowHuntress Managed EDR
See how Huntress' Managed EDR provides additional visibility into endpoint activity and strengthens the EDR functionality within The Huntress Managed Security Platform.
Read Now
How to Survive a Nightmare Attack
Watch our webinar to hear from the team at Progressive Computing as they share their story of the last 12 months.
Watch NowThe Evolution of The Huntress Managed Security Platform & What’s Next
Watch our webinar to hear how we’ve invested in our managed security platform over the years, where we are today and the exciting plans we have for product and talent in the near future.
Watch NowHow Huntress Can Help You Keep Pace with Today's Savvy Threat Actors
Watch a product demo to see the power of threat detection and response backed by human threat hunters.
Watch NowDeNISTifying NIST video series
In these videos, we’ll dig into the five pillars of the NIST framework—identify, protect, detect, respond, recover—and help you apply them to your business. Watch NowPractical Incident Response Planning
Watch our webinar to hear our panel of MSPs and experts as they discuss the ins and outs of incident response planning.
Watch NowHow to Crush Cybercriminals with Managed Antivirus
Watch Kyle Hanslovan and other members of the Huntress team dive into the story of Huntress Managed Antivirus.
Watch NowThe Huntress Advantage: How Huntress Protects SMBs
Get an in-depth, inside look at how Huntress is uniquely built from the ground up to protect SMBs.
Read NowDeNISTifying Cybersecurity: Leveraging A Proven Framework to Evolve Your Stack
In this session, we’ll dig into the five pillars of the NIST framework—identify, protect, detect, respond, recover—and help you apply them to your business.
Watch NowDefender's Handbook: Ransomware
Learn what ransomware is, how ransomware spreads on a network, how to prevent ransomware and what ransomware as a service (RaaS) is.
Read NowCyber Stack Review: What Should Be In Your Stack?
Hear our panel get candid about how they have built their tech stack and road bumps they’ve encountered along the way.
Watch NowLeaving the Silo: A Panel Discussion with DIVD and MSP Vendors
Watch a panel-style discussion to hear about DIVD's bug bounty program—and how SMBs, MSPs and their vendors can work together for a safer 2022.
Watch NowManaged Detection & Response: The Missing Layer in Your Cybersecurity Stack
Discover how MDR can offer the technology and expertise needed to defend against today’s advanced attacks.
Read NowMaking the Switch to Huntress Managed Antivirus: Partner Panel
Watch a partner roundtable to hear from MSP leaders at F1 Solutions and United Systems.
Watch NowThe Persistence Knowledge Kit
A collection of resources to help you sharpen your persistence knowledge and outsmart hackers.
Access NowEvolving the Hunt with New Huntress Tech and Talent
Explore how Huntress is delivering cybersecurity to the 99%. We’ll introduce new additions to the team, new product features and plans for the future.
Watch NowRecovering From a Cyberattack: Not a Matter of If, but When
Today’s cyber threats are upping their game and outsmarting preventive measures. Are you prepared to respond and recover from your worst nightmare?
Watch NowHow Cybercriminals Use Stealth to Hide in Your Network
Learn about the dangers of persistent threats and how to detect them.
Read NowDefender's Handbook: Persistence in Cybersecurity
Learn about persistence in cybersecurity, including common malware persistence mechanisms and advanced persistent threats (APTs).
Read NowThe Ransomware Lifecycle: From Email to Infection
With just a catchy subject line and a few sentences of text, hackers can reel in victims.
Watch NowRecovering From a Mass Ransomware Incident
Join for advice on recovering from a mass ransomware attack like the most recent one deployed through the Kaseya VSA.
Watch NowAn Inside Look at the Dark Web
Get a behind-the-scenes tour of dark web marketplaces and see how the cybercrime economy really works.
Watch NowRedefining Your Stack
It’s time to redefine how you think about your security stack in a way that is sellable, and most importantly, fully protects your clients.
Watch Nowhack_it 2021
A multi-session cybersecurity training event with live demos and exercises designed to help strengthen your hacking skills.
Watch NowIncident Response Kit and Tabletop
Everything you need to run your own tabletop exercise and prepare your team for rapid response.
Access NowTradecraft Tuesday, March 2021
This month, the Huntress team unpacks new details on the Exchange Server zero-day flaws and how hackers exploited recent CVEs.
Read NowMicrosoft Exchange Server Exploitation
The Huntress team has checked over 2,000 Exchange servers and found ~400 vulnerable.
Watch NowRapid Response
Exchange Server Exploitation
The Huntress team has checked over 2,000 Exchange servers and found ~400 vulnerable.
Read NowExploiting Virtual Events
Huntress has discovered zero-day vulnerabilities in multiple virtual event platforms used in the MSP and Fortune 500 communities.
Watch NowManaged Antivirus
Learn about our Managed Antivirus service and how it can help you make the most of your existing investment in Microsoft Defender.
Read NowIncident Response
Case Study
What happens when everything goes wrong and you're faced with a worst-case scenario?
Watch NowThe Missing Piece:
Detection & Response
Learn how Computer Solutions leverages our platform and positions security for their clients.
Watch NowPartnering with Huntress
Discover how Huntress solves a universal cybersecurity gap for your customers and helps you confidently lead the security conversation.
Watch NowRedefining Security
Investment
Learn how Huntress Managed Antivirus can help you extract more value from existing tools.
Watch NowThreatOps
Learn about our human threat hunters, how they operate and the value they deliver to our partners.
Read NowThe MSP
Cybersecurity Journey
A framework to help you—and your customers—identify ways to enhance your security posture.
Read Nowhack_it 2020
A multi-session cybersecurity training event for MSPs with tabletop exercises, malware analysis and more.
Watch NowSelling
Cybersecurity
Learn to have more actionable and outcome-focused security conversations with your customers.
Read NowHave You Ever Watched Someone Get Hacked In Real-Time?
Watch Iconic IT's Director of Technology Matt Lee get hacked in real-time. Watch NowEvolving the Hunt
See how we help SMBs and mid-market organizations fight back against threat actors.
Read NowHuntress MSP
Partner Panel
Learn how to talk to your customers about upgrading and enhancing their security stack.
Watch NowThe Huntress Security
Platform Overview
Explore The Huntress Security Platform, included services and key features.
Read NowThe Missing Piece
In Your Security Stack
See how hackers bypass modern security systems—and how Huntress tracks them down.
Read NowDissecting
a RAT
Get a first-hand look at how threat researchers analyze and understand hacker tradecraft.
Watch NowDefender's Handbook: Endpoint Detection and Response (EDR)
Learn about Endpoint Detection and Response (EDR), including what EDR is, how it works, why it's important and how EDR fits into a security stack.
Read Now