Splunk SOAR Playbook - Malware Triage with Crowdstrike and Splunk Phantom

Tune into the Tech Talk to learn about the combination of Crowdstrike and Splunk Phantom that allows for a smooth operational flow from detecting endpoint security alerts to operationalizing threat intelligence and automatically taking the first few response steps – all in a matter of seconds.

Cybersecurity and OWASP in an Increasingly Digital World

As the world increasingly moves to a digital format, cybersecurity is becoming more important than ever. It’s especially significant since, according to a recent survey by Sophos, 51% of businesses in America experienced a ransomware attack in 2020. That’s a staggering number of security vulnerabilities that truly shouldn’t exist in the modern day and age. Yet, it’s relatively understandable.

Security Questionnaires: Automation Best Practices

While business partnerships require trust, security requires verification. In a world where business relies on data security, vendor risk management is mission-critical to financial success. Organizations rely on vendor security assessment questionnaires as part of their due diligence processes. However, manual questionnaire processes are burdensome and time-consuming, so many organizations are turning to automation to reduce operational costs.

Comply 2 Connect (C2C) - A Solution to Quell the Rogues in Our Midst

Have you ever taken a personal device to work and connected it to the work network? Maybe you connected to the Wi-Fi with a mobile device. Perhaps you brought in a personal laptop and plugged into an open port to connect to the internet. These may seem like harmless activities, and some companies even allow non-corporate devices on their guest network as a way to enable visitors to operate in their environment. In shared office environments, open networks are seen as business enablers.

Cloud Threats Memo: Misconfigurations as a Threat Vector Continue to Rise

In this hyperconnected world, where 70% of users continue to work remotely, sharing data in real-time with partners and customers leveraging the flexibility of the cloud is a fundamental aspect for the daily operations of businesses worldwide. In this scenario, the risk of misconfigurations exposing sensitive data continues to be a serious (and frequent) concern.

AT&T Cybersecurity's managed SASE service wins CyberSecurity Breakthrough award

AT&T Business is all-in on Secure Access Service Edge (SASE) as an essential framework for security-driven networking. As the AT&T Cybersecurity team endeavors to help organizations transition to SASE frameworks, it’s picking up accolades not only from valued AT&T customers but also the broader cybersecurity community.

XDR: Demystifying the Hottest Cybersecurity Buzzword

Extended detection and response (XDR) has transpired into a market description that, in my not so humble opinion, proves to be as troublesome as the phrases “next gen” or “machine learning” were from 2016 to 2020. I’ll quote myself from a popular blog post from my time at Gartner: Naming aside, the one thing that all InfoSec commentators agree on is that XDR is an evolution of the endpoint-centric approach pioneered by legacy security vendors.

What to do if your Computer has been Hacked? How to fix it?

It might be hard to believe that your computer can be hacked, you might have heard people saying I have been hacked and it is a serious threat. People have stored a large number of files containing personal information or sensitive data on their computers and attackers are always looking for ways to get access to them. You may be one of those people who claim, that they have been hacked, but they have no idea what to do next or how to repair the breach.

Arctic Wolf Cloud Detection and Response

The cloud has changed the way we work. Accelerate your cloud transformation and have confidence your business is secure–with Arctic Wolf Cloud Detection and Response. Built atop the cloud-native Arctic Wolf platform, Cloud Detection and Response allows you to experience an effective way to secure activity across both infrastructure as a service platforms–like AWS, Microsoft Azure, and Google Cloud Platform, and applications–such as Microsoft 365, Salesforce, Google Workspace, Box, and Workday.