Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

CloudFabrix Alert Watch - Correlation and Suppression

Modern hybrid-IT environments are monitored by numerous multi-vendor and multi-domain monitoring tools that generate humongous amounts of alerts and events, most of which are not readily actionable. The Industry term for this is “Alert Noise”. Noisy alerts increase the risk of real alerts going undetected causing service outages. These alerts also carry siloed information missing the application or service context.

INETCO Announced as a 2020 Best of FinXTech Awards Finalist for Improving Operations

Over the past 12 months, INETCO’s flagship product, INETCO Insight 7, has gained recognition as the go-to solution for acquiring a level of detail within payment transaction data sets that is unprecedented, and extremely useful. Recently, INETCO caught the attention of Bank Director, an information resource to the financial community with a focus on the strategic issues most fundamental to a bank’s CEO, senior leadership team, chairman and independent directors.

Hunting COVID Themed Attacks With IOCs

This blog post is part twenty-four of the "Hunting with Splunk: The Basics" series. I've been dealing with viruses for years, but this is the first time I've written a blog post where we are dealing with actual viruses. Ever since the 2004 tsunami, I have witnessed cyber-baddies using current events to trick users into opening documents or clicking on links. The COVID-19 breakout is no different.

How to Conduct a Vulnerability Assessment

A vulnerability assessment or vulnerability analysis is the process of identifying the security vulnerabilities in your network, systems, and hardware and taking steps to fix those security vulnerabilities. A vulnerability assessment can provide information that your IT and security teams can use to improve your company’s threat mitigation and prevention processes.

The Zero Trust Authorization Core

The Foundation of a Zero Trust Architecture (ZTA) talked about the guiding principles, or tenets of Zero Trust. One of the tenets mentions how all network flows are to be authenticated before being processed and access is determined by dynamic policy. A network that is intended to never trust, and to always verify all connections requires technology that can determine confidence and authorize connections and provide that future transactions remain valid.

File shadowing: The key to a swift recovery from USB and file-based attacks

USB devices are undeniably valuable, but they can be dangerous. On one hand, they are useful in transporting enterprise-critical data, but on the other, they can wreak havoc if misplaced, corrupted due to a human or hardware-related error, or stolen. It’s no wonder some companies forbid the use of USB devices altogether.

Falco Support on AWS Fargate

Today we’re very excited to announce a partnership with Amazon to support Fargate in Sysdig’s product line. We are also announcing that Falco, the world’s most popular runtime security tool for containers, will soon be able to work on Fargate. This is an important milestone. For the first time, Fargate users will enjoy the benefit of deep instrumentation. This will make their workloads more secure, reliable, and efficient.

What Security Leaders Should Consider When Building a Business Case for Integrity Monitoring

We all know there are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need to adhere to CIS controls as they provide a critical baseline for maintaining our security framework and keeping up our integrity monitoring processes.

Auditing Cloud Administrator Behavior as a Matter of Data Breach Preparedness

New technologies often present interesting challenges for security teams, with cloud services such as AWS, Azure and GCP providing particularly novel cases in comparison to “classic” on-premise systems. As cloud services race to add new features that drive new customer interest and increase retention of existing clients, there is a very real risk of exposing new threat vectors to the business if even the most minor of misconfigurations occurs.

Working Anywhere With Egnyte: Productivity Guide

What’s the ideal state of a technology-driven, digital-first organization? Ultimately, it’s where everything you need (and need to do) is right at your fingertips regardless of your location or the tools you have at your disposal. When companies pursue digital transformation, they often do so with a few primary goals in mind, like security, simplicity and productivity.