Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

To the Point: Top State CIO and CISO Priorities for Tomorrow's Landscape with Teri Takai

In this episode of To the Point, Teri Takai, Senior Vice President for the Center for Digital Government, and renowned public-sector technology leader, brings her wealth of experience to highlight the shifting priorities for state CIOs and CISOs as they prepare for the complexities that they face in a constantly evolving cyber landscape. From AI safeguards to the critical role of data management, this episode provides actionable insights for IT leaders at every level.

Tanium Converge 2024 Recap - Tanium Tech Talks

Tanium Converge 2024 announced some amazing tech! Join two Tanium talkers for an insiders look as we review what happened during this special week. Find out which keynotes to watch on-demand for free. Also check out the other in-person Converge interviews on the Tanium Tech Talks playlist on the channel here. Will we see you there in 2025? Tanium's 2024 Converge user conference was held November 17-21 in Orlando, Florida. Converge 2025 will be in Orlando, Florida, November 17-20.#CatchMeAtConverge.

Tanium Semiannual Release SAR - Tanium Tech Talks #113

The new semiannual release schedule is for customers that use Tanium on premises. The semiannual releases streamline the deployment process and enhance the stability and predictability of Tanium solutions. By transitioning from weekly updates to semiannual releases, Tanium aims to ease the work involved for Tanium administrators to plan and deploy releases. See how on-prem customers get all the enhancements already enjoyed by cloud customers in high-quality, predictable releases.

Top Tool Capabilities to Prevent AI-Powered Attacks

Recent advances in AI technologies have granted organizations and individuals alike unprecedented productivity, efficiency, and operational benefits. AI is, without question, the single most exciting emerging technology in the world. However, it also brings enormous risks. While the dystopian, AI-ruled worlds of sci-fi films are a long way off, AI is helping cyber threat actors launch attacks at a hitherto unknown scale and level of sophistication. But what are AI-powered attacks?

Streamlining IT: Integrating device security and compliance with Jamf and Tines

Unlock the potential of automation to simplify and enhance Mac and mobile device security and compliance. Join us as we explore how Tines and Jamf work together to streamline critical tasks for IT and security teams. During the webinar, we covered: Whether you’re focused on device management and security or looking to reduce manual efforts, this session will provide valuable insights for how to optimize your workflows with Tines and Jamf.

How CISOs Can Sharpen Their Board Pitch for IAM Buy-In

In a time when 94% of companies have experienced an identity-related breach, many CISOs feel the urgency to strengthen identity and access management (IAM) across their organizations. In fact, a recent survey of CISOs found that identity is the top focus area going into 2025. However, communicating IAM’s value to the board remains a challenge—it isn’t enough for these security leaders to craft effective IAM strategies—they must also secure their board’s support.

Ivanti Patches Multiple Critical-Severity Vulnerabilities in Cloud Services Application

On December 10, 2024, Ivanti released updates for three critical-severity vulnerabilities impacting their Cloud Services Application. By chaining the vulnerabilities together, a threat actor could obtain administrative privileges via authentication bypass (CVE-2024-11639), which could then allow for remote code execution (CVE-2024-11172) and/or SQL injection (CVE-2024-11173).

5 Key Data Protection Challenges and How to Overcome Them

Organizations understand their sensitive data is everywhere — and adversaries are after it. Data protection solutions have become an essential part of modern cybersecurity strategies. Organizations realize that in order to avoid a breach, they must have a plan to monitor and control data flow at the user level so they can better understand where data is going, who is accessing it and when malicious activity occurs. But when it comes to deployment and operationalization, things can get complicated.

Corelight delivers static file analysis with YARA integration

Malicious files continue to be a significant threat to organizations; SonicWall reported more than six billion malware attacks in 2023. To help organizations prepare for and stay ahead of these threats, we’re introducing an integration with YARA that offers a deeper level of inspection for files across enterprise networks while helping security teams consolidate their toolset in the process.