Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Seven Idaho Colleges Suffer Breaches: Students and Staff Impacted

Idaho is home to many popular universities that serve millions of students annually. Seven of the schools in Idaho were recently impacted by a data breach that resulted in a substantial amount of lost information. The vulnerable parties state that they're secure now, but a significant amount of data has already been lost to the attackers. Learn more about the stolen data and the schools involved in this attack.

Monitoring Networks with Snort IDS-IPS

Networks are the data highways upon which you build your digital transformation infrastructure. Like interstate highways transmit goods, networks transmit data. Every connected user and device is a network digital on-ramp. When malicious actors gain unauthorized access to networks, organizations must detect and contain them as quickly as possible, requiring security analysts to embark on a digital high-speed chase.

From Resurface to Graylog API Security: The Next Chapter

When I started Resurface, my core thesis was that web and API security brought unique requirements requiring purpose-built data systems. Using Splunk at scale for API monitoring was/is prohibitively expensive. Using Hadoop or Kafka requires a nerd army to run at any scale. Few data platforms include a mature web or API monitoring model, so this has to be custom-overlaid at significant expense.

Understanding GitGuardian Roles and Teams

GitGuardian makes it easy for teams of any size to manage code security. We also make it simple to manage access to the GitGuardian dashboard as your security team grows and you need to assign roles and permissions. In this video, we will take a closer look at the various Workspace member roles. We will also explore how to create and manage Teams, allowing you to group users and incidents, as well as give users more fine-grained permissions.

Tanium Demo: Introducing Tanium screen sharing services powered by ScreenMeet

With Tanium Screen Sharing Services, powered by ScreenMeet, customers get simple one-click screen sharing for IT Ops, Security and Support. In this demo we present the end-to-end experience starting in Tanium and ending on the endpoint with ScreenMeet’s remote control tools. In a business environment of remote and hybrid work, screen sharing is an essential enabler of internal collaboration and swift resolution of challenging IT issues.

Top Five Password Security Tips

The most important tips for password security include choosing long, complex, unique passwords, not storing them in easy-to-hack places and using a password manager. Unfortunately, most people don’t follow best practices for password security. According to Keeper Security’s 2023 Password Management Report, only 25% of people use strong, unique passwords for all of their accounts. That means 75% of people have insufficient password practices.

Trustwave Named a Leader in ISG Provider Lens for Cybersecurity Solutions and Services

For the second consecutive year, Information Security Group (ISG) named Trustwave a Rising Star in Managed Security Services (MSS) for U.S. Large Accounts and for the first time as a Leader in MSS for U.S. Midmarket in its 2023 Provider Lens™ Quadrant Report. ISG recognized Trustwave for its holistic offering with enhanced visibility, continuous threat monitoring and hunting, and its elite partnerships.