Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Choosing a Tech Cyber Risk Remediation Product (Key Features)

Cyber risk remediation, the process of actively identifying, remediating, and mitigating cybersecurity risks, is particularly critical for the technology industry. With its characteristic enthusiasm towards adopting the latest trends in innovation, without a cyber threat remediation product, tech companies are unknowingly increasing their risk to a swatch of data breach risks.

Discussions on improving security through chaos engineering

When you rely on a tool to support you in an intense situation, you probably want reassurance that it got tested for extreme conditions. For example, if you’re about to go skydiving, you'd want to know that the parachute strapped to your back underwent rigorous testing and will perform it's needed most. The same is true with the systems supporting our security initiatives. What happens when those systems are under high pressure in an emergency?

Incode Technologies' Jeff Moss: Scaling security for startups and defending against the ever-growing attack surface

In this episode of The Future of Security Operations podcast, Thomas speaks to Jeff Moss, Senior Director, Information Security, at Incode Technologies. Incode is the leading provider of world-class identity solutions for the world’s largest financial institutions, governments, retailers, hospitality organizations, and gaming establishments.

3 Tips for Improving your Cybersecurity Intelligence

Cybersecurity intelligence is a powerful weapon against risk. It enables you to discover, proactively respond, and mitigate emerging threats—internally and across your supply chain. But how can you improve your cybersecurity intelligence without overburdening busy teams? Here are three ways you can combine technology, processes, and people to effectively acquire, analyze, and disseminate intelligence to improve your organization’s security posture.

Robinhood's David Seidman: The tradeoff between technical mastery and strong management

In this episode of The Future of Security Operations podcast, David Seidman joins Thomas to discuss their career to date and what they have learned along the way. David is currently Head of Detection and Response at Robinhood, an online brokerage firm with a mission to democratize finance for everyone. David has almost 20 years of experience in software and security, having worked for huge names like Microsoft, Google, Salesforce, and now Robinhood.

How to Build a Dedicated Development Team: A Comprehensive Guide

In today's fast-paced digital landscape, the demand for software development teams is skyrocketing. Companies around the world are constantly seeking innovative ways to leverage technology to stay competitive, deliver exceptional products, and drive business growth. One approach that has gained significant popularity is hiring a dedicated development team. In this article, we will explore the benefits of dedicated software development teams and outline a step-by-step guide on how to hire one.

MDR firm saves $100K per year with LimaCharlie

Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. After switching from their custom-engineered security stack to the LimaCharlie SecOps Cloud Platform, they achieved an annual cost savings of $100,000, improved their mean detection and response times by 98%, and laid the groundwork for scalable, long-term growth.

Enhance Productivity with Egnyte for Microsoft Teams Integration

Microsoft Teams is the world’s most popular collaboration tool - used by over 300 million users globally. Its popularity stems from its breadth of collaboration capabilities, including instant chat, conversational channels, online meetings, and video calls. However, the sheer volume of content generated by these collaboration workflows can quickly lead to content management challenges.

Bad Actor Uses Fake Android Chat to Install Malware

Researchers at CYFIRMA warn that the Bahamut threat actor is using a malicious Android app to deliver malware. “The suspected Android malware, known initially as ‘CoverIm’ was delivered to victims via WhatsApp, and was found to be disguised as a dummy chatting application named ‘SafeChat,’” the researchers write.

KnowBe4 Chooses Drata as Our Exclusive GRC Partner

Drata is KnowBe4’s preferred compliance automation platform for KnowBe4 customers. We have some big news. KnowBe4 has selected Drata as our exclusive GRC partner. What does that mean? As we transition KnowBe4 Compliance Manager (KCM) offering to a support-only model, we are encouraging all our current users to migrate to Drata for their compliance automation needs. After an exhaustive assessment of vendors in the market, we chose Drata for a few reasons. Here's what made Drata different.