SANSFire: An Alert Has Fired. Now what?

While the security industry spends a lot of time and energy getting more and/or better alerts, comparatively little investment has gone into helping analysts operationalize and contextualize those alerts. This webcast will discuss how a solid foundation of network telemetry can enable not only high-velocity, high-confidence processing of alerts of all stripes, but also a host of other critical security applications, from fundamentals like asset management to advanced techniques like proactive threat hunting. Real-world examples and code will be used throughout the talk, along with practical considerations for operating in an enterprise environment.

Changing eKYC regulations: Are FI's ready to make a headway?

India ranks as one of the top two countries in the world in terms of digital adoption as per a McKinsey report. Over the last few years, initiatives such as Aadhaar, the national biometric digital identity program, have included over a billion Indians. India has also pioneered the United Payments Interface (UPI), a singular platform available as a mobile app that allows instant and cost-effective money transfer across people and businesses.

It's Time to Get Hip to the SBOM

The DevOps, IT security and IT governance communities will remember 2021 as the year when the Software Bill of Materials , or SBOM, graduated from a “nice to have” to a “must have.” Around for years, the SBOM has now become a critical DevSecOps piece, which everyone must thoroughly understand and incorporate into their SDLC (Software Development Lifecycle).

Snyk Container meets Cloud Native Buildpacks: Cloud Native Application Security the right way

So you’re running microservices in containers? Congratulations! This is an important step towards meeting those business needs around delivering applications to the hands of your customers as soon as possible. But how can we mitigate any potential risks associated with faster software deployment? Simple, with Snyk.

Anatomy of a Supply Chain Attack: How to Accelerate Incident Response and Threat Hunting

In recent months, we’ve seen a sharp rise in software supply chain attacks that infect legitimate applications to distribute malware to users. SolarWinds, Codecov and Kesaya have all been victims of such attacks that went on to impact thousands of downstream businesses around the globe. Within minutes of these high-profile attacks making headline news, CEOs often ask: “Should we be concerned? How is it impacting us? What can we do to mitigate risk?” .

SQL Injection explained in 1 minute

SQL injection, also known as SQLi, is one of the most dangerous vulnerabilities for online applications. It's a common method used by attackers to manipulate and access database information that would otherwise not be displayed or provided to the website user. In this video, you'll learn what SQL injection is and why you should be aware of it.

How to Use Egnyte to Protect Against Insider Threats

Vigilant companies continuously review risks and their cybersecurity postures. They deploy active defense-in-depth measures and utilize the latest malware detection and mitigation techniques. However, there is one type of vulnerability that tends to fall through the cracks—insider threats. That’s because IT organizations often believe it’s management’s problem to address, while managers believe IT groups have insider threats under control.

What are bots costing gaming and betting companies?

As the pandemic pushed more businesses to an online-first model, cybercriminals seized opportunities to profit from fraudulent activity. But the financial impact of these attacks on businesses has been hard to quantify. Netacea recently surveyed 440 businesses from across the USA and UK to understand how much financial impact bot attacks are having across different industries.

Cyber Defenders Defending Critical Infrastructure Interview with Aaron Cockerill

Nextgov interview with Aaron Cockerill for a conversation shaped by today’s topics of critical infrastructure and cybersecurity threats. Discussing everything from phishing attacks to hybrid-remote work best practices, this interview offers insight into how Lookout can help both public and private organizations address digital threat prevention, providing relevant context to the cybersecurity world going forward.

The Next Big Challenge: Cloud Complexity

Cybersecurity remains an ever-growing concern in our digitized, post-pandemic world. While rapid digitization opens doors to ample benefits and business opportunities, companies also have to deal with an uptick in cybercrimes, as criminals and other threat actors raise their game, making cyber attacks more frequent and complex than ever before. Consequently, businesses have suffered serious losses resulting from ransomware attacks, data breaches, and theft of trade secrets.