Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Resurface to Graylog API Security: The Next Chapter

When I started Resurface, my core thesis was that web and API security brought unique requirements requiring purpose-built data systems. Using Splunk at scale for API monitoring was/is prohibitively expensive. Using Hadoop or Kafka requires a nerd army to run at any scale. Few data platforms include a mature web or API monitoring model, so this has to be custom-overlaid at significant expense.

What is Open Source Intel? Definition, Tools, & Solutions

In the digital age, an organization’s cybersecurity posture is as strong as its intelligence. Open-source intelligence (OSINT) has emerged as a vital tool for businesses, non-profit organizations, and governments alike to fend off cyber threats. This guide offers a deep dive into the realm of OSINT, detailing its importance, applications, challenges, and how SecurityScorecard’s cybersecurity assessment platform empowers organizations to utilize it effectively.

Elastic + Cribl help organizations migrate SIEM and keep it simple

SIEM (security information and event management) migration is rarely easy. However, when budget constraints, performance issues, or new requirements to further reduce organizational risk lead you down that path, it’s often a good idea to investigate ways to simplify the process. Elastic® and Cribl® have partnered to provide our customers with tools that simplify the process and provide ongoing value to your security operation.

Trustwave Named a Leader in ISG Provider Lens for Cybersecurity Solutions and Services

For the second consecutive year, Information Security Group (ISG) named Trustwave a Rising Star in Managed Security Services (MSS) for U.S. Large Accounts and for the first time as a Leader in MSS for U.S. Midmarket in its 2023 Provider Lens™ Quadrant Report. ISG recognized Trustwave for its holistic offering with enhanced visibility, continuous threat monitoring and hunting, and its elite partnerships.

4 Tips for Effective Cyber Vigilance as Your Attack Surface Expands

Cyberattacks are on the rise. In 2022, there was a 38 percent increase in global attacks compared to the previous year—and security teams are struggling to keep up. It now takes an average of 277 days for teams to identify and contain a breach. With so many alerts being received by the Security Operations Centers (SOCs) each day, how do teams decide which issues to address first?

The New Era of AI-Powered Application Security. Part Two: AI Security Vulnerability and Risk

AI-related security risk manifests itself in more than one way. It can, for example, result from the usage of an AI-powered security solution that is based on an AI model that is either lacking in some way, or was deliberately compromised by a malicious actor. It can also result from usage of AI technology by a malicious actor to facilitate creation and exploitation of vulnerabilities.

12 Best Practices for Banking and Financial Cybersecurity Compliance

Financial data is a desired target for cybercriminals. Hackers frequently attack financial institutions such as banks, loan services, investment and credit unions, and brokerage firms. Security incidents in the financial sector are extremely expensive (surpassed only by the healthcare industry), with the average total cost of a data breach reaching $4.35 million in 2022.

Everything You Need To Know About Insider Threats

An insider threat is a cyberthreat that happens within an organization. Insider threats occur when current or former employees, partners, contractors or vendors cause sensitive data and systems to become compromised or steal data for their own malicious purpose. Insider threats can be intentional or unintentional, depending on the goal of the insider and if the insider is working with someone else.