Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

New look, who dis? LimaCharlie's brand evolution.

Today we are launching an evolution of the LimaCharlie brand as part of our refreshed identity. The intention of this post is to simply let you know about the change, so you won’t be surprised when things coming from us look a little different. Similar to our introduction of the SecOps Cloud Platform, this evolution of our logo and brand is not driven by change for the sake of change.

It's time to adapt: Why we've chosen to implement an adaptive security architecture in Egress Intelligent Email Security

Almost every organization freely admits that people are the biggest risk to its security. This year’s Data Breach Investigations Report by Verizon highlights that 74% of incidents involved the human element. People are a ‘soft’ target for cybercriminals. Networks and software can only be exploited if pre-existing vulnerabilities are discovered and hacked before they’re patched. People, however, can be engineered into creating vulnerability at any time.

Seven Idaho Colleges Suffer Breaches: Students and Staff Impacted

Idaho is home to many popular universities that serve millions of students annually. Seven of the schools in Idaho were recently impacted by a data breach that resulted in a substantial amount of lost information. The vulnerable parties state that they're secure now, but a significant amount of data has already been lost to the attackers. Learn more about the stolen data and the schools involved in this attack.

Monitoring Networks with Snort IDS-IPS

Networks are the data highways upon which you build your digital transformation infrastructure. Like interstate highways transmit goods, networks transmit data. Every connected user and device is a network digital on-ramp. When malicious actors gain unauthorized access to networks, organizations must detect and contain them as quickly as possible, requiring security analysts to embark on a digital high-speed chase.

From Resurface to Graylog API Security: The Next Chapter

When I started Resurface, my core thesis was that web and API security brought unique requirements requiring purpose-built data systems. Using Splunk at scale for API monitoring was/is prohibitively expensive. Using Hadoop or Kafka requires a nerd army to run at any scale. Few data platforms include a mature web or API monitoring model, so this has to be custom-overlaid at significant expense.

Understanding GitGuardian Roles and Teams

GitGuardian makes it easy for teams of any size to manage code security. We also make it simple to manage access to the GitGuardian dashboard as your security team grows and you need to assign roles and permissions. In this video, we will take a closer look at the various Workspace member roles. We will also explore how to create and manage Teams, allowing you to group users and incidents, as well as give users more fine-grained permissions.

Tanium Demo: Introducing Tanium screen sharing services powered by ScreenMeet

With Tanium Screen Sharing Services, powered by ScreenMeet, customers get simple one-click screen sharing for IT Ops, Security and Support. In this demo we present the end-to-end experience starting in Tanium and ending on the endpoint with ScreenMeet’s remote control tools. In a business environment of remote and hybrid work, screen sharing is an essential enabler of internal collaboration and swift resolution of challenging IT issues.