Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 28 - Safeguarding Data in the Cloud

In this episode of the Trust Issues podcast, host David Puner interviews Brad Jones, CISO and VP of Information Security at Seagate Technology. They delve into cloud security challenges, including protecting data in a constantly shifting technological landscape. Jones discusses the importance of establishing trust as a data company and implementing rigorous controls to safeguard sensitive information.

EPP vs EDR - What's The Difference?

With so many different endpoint security options available, it’s essential to understand the features and benefits of each solution before determining which best suits your organisation. The two main forms of advanced endpoint security, as categorised by Gartner, are Endpoint Protection Platforms (EPP) and Endpoint Detection and Response Solutions (EDR). In this blog post, we outline the key differences between the two, how they work and how to get the most out of them.

Turning Intelligence Into Action with Cybersixgill and Torq

No matter the industry, geography, or organizational size, cybersecurity teams are united by their many shared challenges: talent shortages, expanding attack surfaces driven by digitization and remote work, increasing velocity of software development, and the rapidly growing scope and sophistication of global cybercrime. In response, these teams have embraced and incorporated a range of specialized tools within their defensive arsenal in attempt to address and resolve these issues.

Track Risk Trends in your Container Images with Sysdig Risk-based Vulnerability Management

The number of detected common vulnerabilities and exposures (CVEs) has significantly increased in the past decade. In the last five years, security researchers reported over 100,000 new CVEs. The highest reported annual figure was in 2022, with over 25,000 new CVEs. This number can overwhelm any security team if it’s not managed correctly between assessment, reporting, remediation, and monitoring.

Lessons from Lapsus - CISO on Building a comprehensive secrets management program

Following a breach by the Lapsus$ cyber gang, Jason Haddix, then CISO of UbiSoft called over 40 other CISOs to discuss strategies on how to be more resilient to attacks. Those conversations led him to create a 4 step guide to building a comprehensive secrets management program.

June Update: The Escalation of the PaperCut Vulnerability Campaign

Over the past two months, the Cyberint research team has witnessed an extensive campaign in which threat actors are actively exploiting the recently discovered vulnerability in the PaperCut print management platform. The Cyberint research team has identified a significant trend in relation to these recent attacks and associated incidents linked to this vulnerability.

How to Make Your Email More Secure

You use your email address for a wide variety of things such as when you’re shopping or setting up an online account. Because your email is linked to so many different accounts, securing it is crucial to keeping your other accounts safe, since most password resets are sent to your email address. To make your email more secure you should create a strong password, enable MFA and always log out of your account.

ChatGPT and Cato: Get Fish, Not Tackles

ChatGPT is all the rage these days. Its ability to magically produce coherent and typically well-written, essay-length answers to (almost) any question is simply mind-blowing. Like any marketing department on the planet, we wanted to “latch onto the news.” How can we connect Cato and ChatGPT? Our head of demand generation, Merav Keren, made an interesting comparison between ChatGPT and Google Search.