IoT Devices Built to Meet Cybersecurity Needs

The Internet of Things (IoT) includes items such as smart appliances, smartwatches, and medical sensors. For organizations to enjoy all of the benefits and convenience of IoT devices, enterprise customers must fully understand the potential risks and threats to their systems and the underlying data. IoT devices often lack built-in security controls, a situation which creates risks and threats for federal agencies and consumers.

Cybersecurity Insights - Cyber Insurance Now Requires MFA

Recent cybersecurity incidents and ransomware attacks are driving companies to apply for cyber insurance. When doing so, companies have been facing one new prerequisite to become eligible: multi-factor authentication protection of your assets. Companies looking into acquiring cyber insurance need to make sure they won’t be paying high premiums, or even have their applications denied. In this session, you will learn from Alexander Cagnoni, director of Authentication at WatchGuard.

What is Data Loss Prevention (DLP) And How Does It Work

Every year, business owners grapple with the same question: how can I keep my data safe? One survey found that 47% of small business owners found data security to be their biggest challenge; a further 42% said preventing data loss was also keeping them up at night. Data loss prevention is a clear priority for enterprises of all sizes.

What You Need to Know About NERC CIP Compliance

Utility companies are increasingly being targeted by cybercriminals. Although the highest profile utility cyber attack in recent memory was the May 7 ransomware attack on Colonial Pipeline that caused gas shortages on the East Coast, power companies of all kinds are popular with criminals for a reason: they can’t afford a shutdown and they have the money to pay a ransom.

Elastic on Elastic Series: Data collected to the Infosec SIEM

The Elastic Infosec Detections and Analytics team is responsible for building, tuning, and maintaining the security detections used to protect all Elastic systems. Within Elastic we call ourselves Customer Zero and we strive to always use the newest versions of our products.

PowerShell Detections - Threat Research Release, August 2021

The Splunk Threat Research Team (STRT) most recently began evaluating more ways to generate security content using native Windows event logging regarding PowerShell Script Block Logging. This method provides greater depth of visibility as it provides the raw (entire) PowerShell script output. There are three sources that may enhance any defender's perspective: module, script block and transcript logging.

Explore and experience cybersecurity from a consulting point of view

The demand for highly qualified staff with the right skill sets along with hands on experience is not new news in cybersecurity. However, the difficulty of gaining experience prior to meeting the objectives for interviews for entry level jobs can be a tough hill to climb. Ample resources available online, including the ability to set up in-home labs, which helps.

Security Posture of the ASX 200 // Webinar

Are Australian businesses prepared for cyberattacks? We assess the security posture of the ASX 200. In our latest research, we assessed the scale of cyber risk in Australia by examining the ASX 200, the index of the top 200 public companies in Australia by market capitalization. Join Greg Pollock, VP Cyber Research, and Josh Kiff, VP Sales, as we explore the eye-opening findings.