Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has resurfaced with an approach that was believed to be long gone: VBA macro-enabled documents. This comes just four months after Europol dismantled various trick bots—including Bumblebee, IcedId, Pikabot, TrickBot and systemBC—during a crackdown called Operation Endgame.

Decoding SEBI's CSCRF: VAPT and Steps to Cyber Resilience?

The Securities and Exchange Board of India (SEBI) has raised the bar on cybersecurity with its newly introduced Cybersecurity and Cyber Resilience Framework (CSCRF), effective August 20, 2024. For regulated entities (REs)—including stockbrokers, depositories, asset managers, and alternative investment funds—the framework not only requires compliance but also lays out a clear path toward resilience. These new guidelines require REs to implement VAPT and risk management, among other mandates.

Proactive cybersecurity leadership: Implementing the NIST Cybersecurity Framework (CSF)

According to a recent Gartner report, 88% of boards view cybersecurity as a business risk, not just an IT issue, underscoring the critical need for organizations to adopt robust, scalable frameworks to manage cybersecurity risks. In today’s rapidly evolving threat landscape, frameworks like the NIST Cybersecurity Framework (CSF) are pivotal for safeguarding organizations from vulnerabilities while maintaining alignment with business objectives.

"Q&A: Digital Threats Landscape" with Joseph Menn

Join us for an insightful conversation with Joseph Menn, veteran cybersecurity reporter for the Washington Post and author of "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." In this closing keynote discussion, Menn shares his perspectives on the evolution of cybersecurity, exploring the complex relationship between technology advancement and security.

How to Perform Hyper-V Storage Migration: A Step-by-Step Guide by NAKIVO

Hyper-V Storage Migration is Microsoft’s technology for moving the storage of virtual machines (VM) from one location to another without resulting in compatibility issues. Moreover, Hyper-V Storage Migration can be performed on live VMs, allowing you to avoid any downtime and continue business operations as usual. Watch this video walkthrough on how to use Hyper-V Manager and PowerShell to launch and configure Hyper-V Storage Migration.

Cloud Trends : How They're Reshaping Cybersecurity

Cloud adoption is accelerating, but with it comes new security challenges. In this video, we discuss: The rise of multi-cloud and hybrid cloud strategies. Key security concerns like visibility gaps and the shared responsibility model. How to stay secure while trusting—and verifying—your cloud provider. Takeaways: Understand cloud trends, security risks, and your role in protecting your workloads.