Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Single Vendor SASE vs. the Alternatives: Navigating Your Options

SASE sets the design guidelines for the convergence of networking and security as a cloud service. With SASE, enterprises can achieve operational simplicity, reliability, and adaptability. Unsurprisingly, since Gartner defined SASE in 2019, vendors have been repositioning their product offerings as SASE. So, what are the differences between the recommended single-vendor SASE approach and other SASE alternatives? Let’s find out. This blog post is based on the e-book “Single Vendor SASE vs.

The Evolution of Network Perimeters | Remote Work

In this video, we delve into the fascinating journey of network perimeters. Remember when the traditional network barrier seemed impenetrable? Join us as we explore how the shift to remote work initially signaled the demise of the conventional network perimeter. But guess what? We're not done with this story. With the return to office spaces, we're witnessing the resurgence of a more traditional network approach. However, it's clear that the landscape has forever changed. When was the last time you heard the term LAN thrown around?

The Importance Of Firewall Penetration Testing In Your Security Strategy

Firewall Penetration Testing is an essential part of any security strategy. It tests the effectiveness of firewalls and other network security measures by attempting to breach them, exposing vulnerabilities before attackers can exploit them. By conducting regular firewall penetration tests, organisations can protect their networks from malicious actors trying to gain access or disrupt operations.

Sharing is Not Caring: Hunting for Network Share Discovery

Organizations rely on interconnected systems to store, share and manage information. These ecosystems often incorporate network file shares, which act as repositories of various types of data within an organization. Unfortunately, it is not uncommon for sensitive files to find their way onto these network shares inadvertently with permissions that are too broad or not properly restricted.

Achieving NIS2 Compliance: Essential Steps for Companies

In an increasingly digital world, cybersecurity has become a critical concern for companies. With the rise of sophisticated cyber threats, protecting critical infrastructure and ensuring the continuity of essential services has become a top priority. The EU’s Network and Information Security Directive (NIS2), which supersedes the previous directive from 2016, establishes a framework to enhance the security and resilience of network and information systems.

Ongoing Ransomware Campaign Against Cisco ASA VPN Appliances

Arctic Wolf has been tracking multiple intrusions where Cisco VPN account credentials were harnessed by Akira ransomware for initial access. In a recent Cisco PSIRT advisory, Cisco stated they were aware of reports that Akira ransomware threat actors have been targeting Cisco VPNs that are not configured for multi-factor authentication to infiltrate organizations. Our case data supports the observation that affected accounts did not have MFA enabled.

When the largest pure-play cybersecurity company shares your vision: Palo Alto Networks and LimaCharlie

When we put forward a vision for cybersecurity talking about building one platform that covers all security operations - or as we call it SecOps Cloud Platform - we could not have imagined that a month later, the world’s largest pure-play cybersecurity company would buy into this vision. This alignment is flattering, to say the least. Yesterday, Cole Grolmus of Strategy of Security published an article titled The Audacious Future of Palo Alto Networks.

SOC Visibility Triad, Why You Need NDR Alongside EDR

Defenders face numerous challenges in their complex, ever-expanding environments. Good data or network truth shouldn't be one of them. As Corelight is the standard in the NDR market, we will explore how to pivot from NDR to several EDR tools. The demo will showcase popular tools and give analyst workflow examples and use cases. Speaker: Steven Swaim (Principal Federal Sales Engineer, Corelight)

Understanding Firewalls - Types, Configuration, and Best Practices for Effective Network Security

A firewall is a security device that controls the flow of traffic across a network. A firewall may be a hardware appliance, or it may be a piece of software that runs on a third-party operating system. Firewalls operate based on a set of pre-defined, as well as customizable security rules that inspect network traffic to block or permit access to a network.