Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JUMPSEC Summer Industry Briefing Benchmarking EDR/MDR solutions

Benchmarking EDR/MDR Solutions presented by Tom Ellson, Head of Offensive Security We recently completed a review of a number of industry-recognised EDR and MDR solutions. This led us to take a novel approach that addresses many of the limitations and constraints typically met when undertaking this type of assessment. You will learn why context is key to threat detection, and how the different vendors performed in our realistic and representative environment against goal-focused attack paths.

JUMPSEC Summer Industry Briefing UK Threat Landscape Trends

UK Threat Landscape Trends - Presented by John Fitzpatrick, CTO John Fitzpatrick reflects on the last six months, examining the key threats and trends we have observed affecting UK institutions. Specifically, we will delve into ransomware threat evolution, presenting and discussing. This will build upon our predictions made at the last briefing, reviewing how the landscape has changed, how our predictions fared, and how it has been influenced by major cyber security events and developments.

JUMPSEC Summer Industry Briefing Understanding your Attack Surface

Understanding Your “Attack Surface” presented by Max Garaffa Attackers can access a huge amount of open-source information about your organisation over the internet. You will learn how to locate this information, understand what is most dangerous, and what you can do to counter the threat. This intelligence can be used for both offence and defence, which we have explored in recent engagements for our clients.

Assessing Cybersecurity in M&A Diligence

Here’s why you should check a company’s overall cyber security health before acquiring it: You could be doing a great job protecting your company. But then, if you merge with a business with holes and attackers are already inside it, their problem becomes your problem. So you need to build a rigorous methodology and a playbook to assess the security of your target during the M&A diligence. Here’s how you can do it.

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

5 Major Cyberthreats Facing the BFSI Industry

Cybersecurity in the BFSI industry is one of the critical areas of concern today. The banking and financial services industry is highly regulated on the cybersecurity front. Why is it so? The total cost of data breaches in the financial sector in 2021 was USD 5.72 million on average, second only to the healthcare industry. The growing sophistication, severity, and lethality of cybersecurity threats to the financial sector further accentuate the industry’s challenges.

GBBN makes end users happier and more productive with Egnyte rollout

GBBN Architects successfully rolled out Egnyte’s file storage and collaboration platform to improve upon aging file server workflows. Leveraging Egnyte’s easy to use link-based access with robust security tools, GBBN has made their distributed design teams more effective while minimizing administrative burdens on the IT organization.