Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detect malicious files with BinLib: a private binary library

We’ll look at one of LimaCharlie’s newest features: Binary Library, or “BinLib”, a private repository of binaries observed in an organization. BinLib opens up new opportunities for detecting malicious files within an organization. Historical searching and YARA scanning allow you to take your binary detection to the next level, as we will observe and discuss in this session.

Deciphering Cyber Insurance, Acts of War, and Espionage

In this intriguing discussion, we delve into the complex world of insurance companies and their strategies for handling cyber threats, particularly when it comes to determining acts of war and espionage. We explore the blurry boundaries and challenges of insuring against these distinct yet interconnected risks in the ever-evolving cyber landscape. Join us for a candid conversation where we attempt to unravel these intricate dilemmas, acknowledging the difficulties in this domain that often leave us with more questions than answers.

CISA KEV's Known Ransomware Attribution

This past week, Patrick Garrity, Security Researcher at Nucleus, spent a lot of time exploring Cybersecurity and Infrastructure Security Agency's update the Known Exploited Vulnerabilities catalog, which now includes attribution to vulnerabilities associated with ransomware campaigns. In this short video, he explores this new addition and walks through the data visualizations he created to provide broader visibility into this new addition.

Securing tomorrow: A roadmap to holistic identity security success

iC Consult, a trusted partner of One Identity, is the world's leading independent consultancy, systems integrator, and managed services provider for IAM. In this video, Andre Priebe, Chief Technology Officer at iC Consult, explores the biggest security concerns facing iC Consult customers today, best practices when embarking on an IAM journey, the importance of implementing a holistic IAM approach and One Identity’s key role in IAM success.

Cybersecurity Power Plays - Strategic Maneuvers for MSPs

In today’s cybersecurity arena, MSPs need a partner that can provide an all-star lineup of layered security solutions through a single platform that enables both comprehensive protection and operational efficiency. WatchGuard and MSPs make a powerful pairing, and those that adopt WatchGuard’s Unified Security Platform architecture are seeing the benefits! Here our partners discuss the power of this partnership and the benefits of combining multiple products within the platform to defeat cyber opponents.