Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detecting Malicious Activity in Microsoft 365

Microsoft 365 is a prime target for adversaries, with objectives ranging from credential harvesting to ransomware. However, managing detection rules can be a cumbersome task, especially as security analysts try to keep up with the ever-changing landscape of telemetry options from Microsoft.

[Webinar] Increase visibility and federal IT network security with Tanium + ServiceNow

In the U.S. Federal Government, too often the superset of assets that need to be managed across an entire department or agency aren’t well understood. Many of the latest executive orders, binding operational directives, and even the most recent White House Cybersecurity Strategy all point to a foundational piece of reducing your attack surface: having an accurate inventory of your assets.

PCI 4.0: What is coming, and what do you need to do about it?

PCI DSS 4.0 is coming, and getting your organization up to speed will be no small task. Don't wait until the last minute. Hear Payment Card Industry (PCI) Qualified Security Assessors Brian Dean and Joe Moser as they explain the key differences between PCI 4.0 and PCI 3.2.1, what to expect with the new release, and which steps you need to take right away to prepare.

The Evolving Role of the CISO and the Language of Resilience with Marene Allison

In this episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by a former CISO at Johnson & Johnson to discuss the ever-evolving role of the CISO. They discuss what she has learned from the biggest threat intrusions in her career, how the role of the CISO is evolving to adapt to new cyber threats, and what we can tactically do to empower more professionals from different backgrounds to pursue a career in cybersecurity.