Listen on Apple Podcasts Listen on SpotifyListen on Google Podcasts
Security Posture Rating
NEWMeasure cybersecurity maturity and get clear, actionable insights that expose gaps, prioritize improvements, and demonstrate real progress.
Managed Detection and Response (MDR)
NEW24/7 SOC combined with contextual intelligence, patented detection logic, and AI-enhanced alerts for rapid threat detection and response
Asset Inventory
NEWComplete visibility across your organization’s attack surface.
Vulnerability Management
NEWIdentify vulnerabilities and prioritizes which ones truly matter within your organization’s context
Cloud Posture
NEWPersistent monitoring, drift detection, and alignment with cloud security best practices to close security gaps
Application Control
NEWExpert currated list of application block rules to simplify management and customize application protection
LogIC (Streamlined SIEM)
NEWHyper-efficient, real-time event collection and automated mapping
Tenant Administrator
NEWIdentify at-risk tenants, track billing and renewals, and instantly act on time-sensitive security issues
Integrations
NEWIntegrations allow your business to streamline its security operations. Centralizing threat detection, response, and monitoring within a unified platform.
Endpoint Detection and Response (EDR)
NEWLightweight, patented technology delivering 24/7 endpoint protection with real-time visibility, threat detection, and response.
Visibility Across Attack Surface
NEWComprehensive visibility across client environment through a unified, contextual view that enables quicker actions, lowers risk, and delivers measurable results.
Prioritize What Matters
NEWCorrelate vulnerabilities, misconfigurations, and threat activity to determine which issues pose the greatest risk
Secure Cloud Identities
NEWProtect your cloud identities from attacks due to misconfigurations, policy drift, excessive permissions, and credential theft
Scale Security Operations
NEWStreamline the entire security lifecycle from asset discovery to threat response with automation, contextual insights, and enhanced efficiency
Meet Compliance Requirements
NEWSimplified logging and compliance with push button deployment and real-time reporting
Improve Cybersecurity Maturity
NEWAssess, monitor, and improve cybersecurity maturity with real-time insights and guided, prescriptive actions
Unified Security Posture
NEWCompassOne Platform
NEWSecurity Operations Center
NEWDedicated threat hunters and remediators, on call 24/7/365, with unparalleled cybersecurity expertise
Adversary Pursuit Group
NEWThis elite team is armed with real-time threat intel, delivering rapid response and unmatched protection.
Managed EDR
NEWUsing our patented technology and arming our 24/7/365 MDR with context to resolve threats faster.
Cloud MDR
NEWExpert security monitoring & rapid, context-driven response for your cloud environments.
Few can say they’ve jumped out of an airplane with a nuclear device strapped to their body, or can claim to be one of the first Americans on the ground in Afghanistan after 9/11. For Phil Reilly, former CIA senior operations officer, elite missions have been the story of his career. Phil joins Jon to discuss his remarkable 29-year run with the CIA and the Army Special Forces training that led to it. From intense Green Beret military training to covert assignments in the paramilitary wing of the CIA, Phil discusses his experiences around the world and how 9/11 changed the course of his career, leading to high-level roles as Chief of Station and Chief of Operations of the CIA Counterterrorist Center. Looking ahead, he discusses the shifting focus of the US to the looming threat of China. Drawing from his elite training, he shares lessons that apply to the private sector business world—like building teams from scratch and handling the stress of high-performance roles.
Welcome to The Unfair Fight, a podcast by Jon Murchison, the founder and CEO of Blackpoint Cyber. Previously an NSA computer operations expert and IT professional, Jon spent more than a decade executing high-priority national security missions. Now, he welcomes experts onto his podcast. Together, they participate in compelling conversations surrounding geopolitics, high-level performance in diverse fields, entrepreneurship, and the current cybersecurity landscape.
Tune in now or check out a previous episode!
Don’t let a lack of awareness leave the organizations you protect vulnerable to sophisticated and elusive attacks. Subscribe now for a weekly roundup of Blackpoint’s empowering articles.
Subscribe now!