Protect sensitive data in customer conversations with Nightfall's Intercom DLP Scanner

Chat and messaging systems have helped customer experience teams expand and improve the services they offer through instant communications. As customers reach out to your business via platforms like Intercom, they can often share personal information like personally identifiable information (PII), credentials, email addresses, and credit card numbers (for PCI compliance) in their messages.

SIEM use cases: the importance of bespoke threat detection rules

However, SIEM requires the effective application of use cases or threat detection rules to achieve its full potential. In the first of this two-part series, we outline the importance of SIEM use cases (or rules) and the limitations of relying upon those provided out of the box with SIEM platforms.

Why access management needs to evolve beyond passwords

Access management is a key element of any enterprise security program. Using policies defined by IT administrators, access management enforces access rights across the network. It does this by designating which groups of users are allowed access to which applications and identifying which user attributes are required to access each application. Problems arise for businesses when they base their access management programs entirely around passwords, however.

No Regrets Using Autoregress

If you’re like me, you’ve occasionally found yourself staring at the Splunk search bar trying to decide how best to analyze a series of data, iterating against one or more fields. If your brain gravitates towards traditional programming syntax, the first thing that pops into your mind may be application of a for or while loop (neither of which follow Turing convention in SPL). With commands like stats, streamstats, eventstats, or foreach at your disposal, which one should a hunter use?

4 Cost-effective Cybersecurity Solutions to Enhance Your Defensive Posture Today

October is Cybersecurity Awareness Month, which means that companies are once again surveying the threat landscape. They can’t like what they see. By July 2021, threat actors attempted more than 304 million ransomware attacks, surpassing the 2020 total just halfway through the year. At the same time, the number of phishing scams is soaring, and the cost of a data breach is more expensive than ever before, reaching $4.24 million, according to the most recent industry study.

Running IT at a Hyper Growth Startup

At Teleport we do IT a little differently — supporting a global remote company in hypergrowth is no easy feat and the playbook is different from traditional IT work. In this article, we want to share some of our IT philosophies that enable our employees to keep their agility despite working very asynchronously around the world.

CDN Logs and Why You Need Them

A Content Delivery Network (CDN) is a distributed set of servers that are designed to get your web-based content into the hands of your users as fast as possible. CDNs produce CDN logs that can be analyzed, and this information is invaluable. Why? CDNs host servers all over the world and are designed to help you scale your traffic without maxing out your load balancers. A CDN also gives you added protection against many of the most common cyber attacks. This activity needs to be closely monitored.

Featured Post

An overview of the MSP industry in terms of IT management and security

A recent survey of IT professionals found that 59% of organizations have adopted managed service provider (MSP) services to oversee and monitor their network infrastructure. A quick glance at the MSP sector prompts the basic question: why do organizations outsource their IT control to service providers? The reasons include trimming costs associated with IT network maintenance and receiving better IT support for network issues when they arise. This corresponds to the definition of managed services; the MSP assumes an ongoing responsibility for 24-hour monitoring, managing, and problem resolution for the IT systems within a business.