Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Discussions on improving security through chaos engineering

When you rely on a tool to support you in an intense situation, you probably want reassurance that it got tested for extreme conditions. For example, if you’re about to go skydiving, you'd want to know that the parachute strapped to your back underwent rigorous testing and will perform it's needed most. The same is true with the systems supporting our security initiatives. What happens when those systems are under high pressure in an emergency?

Incode Technologies' Jeff Moss: Scaling security for startups and defending against the ever-growing attack surface

In this episode of The Future of Security Operations podcast, Thomas speaks to Jeff Moss, Senior Director, Information Security, at Incode Technologies. Incode is the leading provider of world-class identity solutions for the world’s largest financial institutions, governments, retailers, hospitality organizations, and gaming establishments.

3 Tips for Improving your Cybersecurity Intelligence

Cybersecurity intelligence is a powerful weapon against risk. It enables you to discover, proactively respond, and mitigate emerging threats—internally and across your supply chain. But how can you improve your cybersecurity intelligence without overburdening busy teams? Here are three ways you can combine technology, processes, and people to effectively acquire, analyze, and disseminate intelligence to improve your organization’s security posture.

Robinhood's David Seidman: The tradeoff between technical mastery and strong management

In this episode of The Future of Security Operations podcast, David Seidman joins Thomas to discuss their career to date and what they have learned along the way. David is currently Head of Detection and Response at Robinhood, an online brokerage firm with a mission to democratize finance for everyone. David has almost 20 years of experience in software and security, having worked for huge names like Microsoft, Google, Salesforce, and now Robinhood.

How to Build a Dedicated Development Team: A Comprehensive Guide

In today's fast-paced digital landscape, the demand for software development teams is skyrocketing. Companies around the world are constantly seeking innovative ways to leverage technology to stay competitive, deliver exceptional products, and drive business growth. One approach that has gained significant popularity is hiring a dedicated development team. In this article, we will explore the benefits of dedicated software development teams and outline a step-by-step guide on how to hire one.

Enhance Productivity with Egnyte for Microsoft Teams Integration

Microsoft Teams is the world’s most popular collaboration tool - used by over 300 million users globally. Its popularity stems from its breadth of collaboration capabilities, including instant chat, conversational channels, online meetings, and video calls. However, the sheer volume of content generated by these collaboration workflows can quickly lead to content management challenges.

Bad Actor Uses Fake Android Chat to Install Malware

Researchers at CYFIRMA warn that the Bahamut threat actor is using a malicious Android app to deliver malware. “The suspected Android malware, known initially as ‘CoverIm’ was delivered to victims via WhatsApp, and was found to be disguised as a dummy chatting application named ‘SafeChat,’” the researchers write.

Honeypot Recon: New Variant of SkidMap Targeting Redis

Since Redis is becoming increasingly popular around the world, we decided to investigate attacks on the Redis instance. We didn’t have to wait long for the first results of the Honeypot. The trap caught an activity about which the Western world does not hear too often while analyzing SkidMap. More importantly, this variant turned out to be a new, improved, dangerous variation of the malware. Its level of sophistication surprised us quite a bit.

5 ways to prevent phishing from ruining your summer vacation

During the summer months, when employees and customers are away on vacation, things usually slow down for businesses. But for cybercriminals, the opposite is true because they are busy taking advantage of minimal staffing levels in companies during the vacation period to launch complex attacks. The U.S. Federal Cybersecurity and Infrastructure Security Agency (CISA), warns that the risk of being hit by a cyberattacks rises over the holidays and summer vacation-themed phishing attacks gain momentum.