Analyzing Human Layer Risks with Tessian

Year over year, organizations onboard new technologies to improve their cybersecurity posture, yet data breaches are still on the rise. The root cause of data breaches is people. In fact, 85% of data breaches today are caused by human error. Employees have access and control to the business’ most sensitive systems and data.

WatchGuard Wins 2021 TrustRadius Tech Cares Award

For the second year in a row, TrustRadius has recognized WatchGuard in its 2021 Tech Cares Awards! This prestigious awards program celebrates companies that have gone above and beyond to provide strong Corporate Social Responsibility (CSR). TrustRadius CEO Vinay Bhagat had this to say about the honor: “We’re excited to announce our second annual Tech Cares Award winners. The past two years have tested the tech community.

Elastic Security: Building the future of Limitless XDR

At ElasticON Global 2021, the team behind Elastic Security shared how we’re building the future of Limitless XDR (Extended Detection & Response) by unifying the capabilities of SIEM, endpoint security, and cloud security. With Limitless XDR, practitioners can prevent, detect, and respond to the threats of today and tomorrow.

The Rising Tide of Data Breach Awareness

There’s an old saying that “there’s no such thing as bad publicity.” Unfortunately, this doesn’t ring true when it comes to data breaches and ransomware attacks. High profile security incidents continue to make headlines, and those headlines are impacting bottom lines. In response to these, the US federal government is modernizing its own cybersecurity infrastructure, and more state governments are implementing laws to protect citizens.

Sponsored Post

A guide to combat ransomware as we continue to work from home

It's no secret that 2021 has already seen a huge surge in ransomware attacks; we've seen an increase of 64% over last year. Advancements in attack strategies and the shift to remote work are undeniably reasons for this ongoing wave. With most businesses merely testing the waters with hybrid working models, completely returning to work still seems like a far-off reality indicating that these numbers are only likely to swell even further.
Sponsored Post

Stay on top of network threats and breaches with effective third-party patch management

In the current digital age, most enterprises turn to the use of third-party applications for every requirement, from end-user applications for productivity purposes, all the way up to more complex endpoint and Active Directory utility tools. However, with more cyber-threats being identified everyday, enterprises are increasingly aware that the installation of third-party software comes with the considerable responsibility for maintaining the system's security.
Sponsored Post

5 Security Automation Myths Debunked

It has been argued that automation in the workplace tends to be misunderstood. Analysts are keen to point out that, despite myths to the contrary, automation isn't going to put most people out of work, for instance. Nor is AI going to become a real substitute for actual human intelligence. These are compelling arguments for rethinking the way we think about automation in general. But you can take the points further if you analyze the impact of automation on specific domains, such as cybersecurity. Indeed, automation is perhaps nowhere more misunderstood than in the realm of cybersecurity. To prove the point, here are five common myths about automation's impact on security, and why they're wrong.

The Vulnerability Conundrum: Improving the Disclosure Process

The vulnerability disclosure process involves reporting security flaws in software or hardware, and can be complex. Cooperation between the organization responsible for the software or hardware, and the security researcher who discovers the vulnerability can be complicated. In this blog we’ll look at the vulnerability disclosure process, the parties involved and how they can collaborate productively.

Active Directory Discovery Detection: Threat Research Release, September 2021

The Splunk threat research team recently developed a new analytic story to help security operations center (SOC) analysts detect adversaries executing discovery and reconnaissance tasks within Active Directory environments. In this blog post, we’ll walk you through this analytic story, demonstrate how we can simulate these attacks using PoshC2 & PurpleSharp to then collect and analyze the resulting telemetry to test our detections.