Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automating Security and Defensive Framework to MITRE Standards

Learn how to standardize your team's response and implement it consistently through new approaches and updated tools. Enterprise Strategy Group and Torq experts look at how security automation platforms can put world-class security strategies within reach of any team, regardless of size or maturity level.

Strengthening Cyber Security: The Impact of Compliance and Legislation

Josh Davies, Keith Christie-Smith, and I dive into the world of legislation and compliance and explore the stark contrast between the need for rigorous security and the burden placed on businesses to comply. “One of the big problems we have in security is that you spend all this money pre-empting your defence in depth to try to protect you against things that you could perceive could happen to you." Josh Davies

The Need for a Universal Set of Information Security Regulations: Insights from Industry Experts

In this video, we discuss the importance of having a joined-up approach to information security regulations. As a believer in creating a think tank of different information security professionals from various industries and stages of their careers, we explore the benefits of having a universal set of regulations that are not set hard in stone, but rather adaptable to different companies' needs. We understand that different companies have different security measures depending on their business activities, and we aim to bring together experts to develop a comprehensive and flexible set of regulations that can be universally implemented.

How Protecting Your APIs Protects Your Bottom Line

Several big-name API breaches have been in the news over the past few years, but API attacks happen every single day and typically don't make the headlines. Securing your APIs is no longer a luxury, but it’s also not just a burden. This short video shares how protecting your APIs opens the door to real business value.

The 443 Episode 232 - US National Cybersecurity Strategy

This week's episode is all about the White House's recently released National Cybersecurity Strategy. We'll walk through the strategy from top to bottom and discuss the key elements most likely to impact individuals and organizations as well as our overall thoughts on the direction the US Federal Government is planning to take. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Snyk Workflows - Builds & Branching

Snyk integrates with your IDEs, repos, workflows, and automation pipelines to add security expertise to your toolkit. The “menu” of options available to you is extensive, so we created this three-part series to get you started and running. What about when you need to compare different versions of code? This third session of the series covers the more advanced topic of builds and branching and more.

Delivering Continuous Office365 Security Audits

Native auditing tools often lack the ability to customise security according to each organisation’s individual needs. It also lacks continuous auditing automation and easy-to-follow remediation. Octiga gets all these features on a single multi-tenant dashboard, freeing MSPs from the once-off ad hoc audits that go unnoticed.#m365 #office365 #mspartner #managedserviceprovider