Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Researching Illicit Streaming Devices with Graylog

In February 2024, I discovered a whisper campaign targeting folks in critical infrastructure with a pirate streaming box. While Illicit streaming devices are not new, this one is particularly ""chatty"". When I discovered it was communicating to qqcom, I knew I needed to start ingesting logs and needed a SIEM. I was able to quickly deploy Graylog and collect and correlate logs to understand behavior of the device.

2025 Security Predictions: The Forces Reshaping Cybersecurity

As 2025 approaches, cybersecurity leaders are bracing for a year of intensifying challenges. Regulations are tightening, nation-state attackers are refining their strategies, and CISOs are under growing pressure. Aleksandr Yampolskiy, Co-Founder and CEO, Jeff Le, VP of Global Government Affairs and Public Policy, and Steve Cobb, CISO, all from SecurityScorecard, bring sharp focus to what lies ahead. What worked in 2024 may not protect you in 2025.

Do You Need IDS and IPS?

Imagine, for a moment, that your IT environment is the Death Star. You know the rebels will try to rescue Princess Leia. If you’re Darth Vader, you need systems that detect Luke and Chewbacca when they gain unauthorized access and systems that prevent them from accessing the Death Star. As a security analyst, you have varied technologies that detect and prevent malicious actors from gaining unauthorized access to your networks.

The evolution of vulnerability scanning

As application development and deployment evolve, traditional tools alone can no longer handle the dynamic, ephemeral nature of cloud and cloud-native environments. This article explores how cloud-native application protection platforms (CNAPPs) are addressing these challenges to enhance coverage and streamline prioritization.

5 reasons why security teams migrate to a new SOAR platform

The demands on security teams have never been greater and practitioners need tools that can keep pace with evolving threats. Yet, many are still tied to legacy SOAR platforms whose limitations - outdated integration methods, clunky usability, and lengthy deployment timelines - hold teams back from achieving their automation goals. Recognizing when it’s time to pivot is critical. For many teams, next-gen SOAR platforms can also fall short.

The Overlooked Danger Within: Managing Insider Threats

When we think about cybersecurity, we think of malicious actors constantly devising new ways to breach our defenses. While this is critical, it's equally important to understand that another menace can be sitting down the hall. The risk of insider attacks is significant and should not be overlooked. These attacks have floored businesses of all sizes and in various industries, frequently with dire consequences.

DSPM vs CSPM: Key Insights for Effective Cloud Security Management

Most modern organizations have complex IT infrastructures made up of various components like Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), public cloud, and sometimes hybrid environments. While these infrastructures bring significant benefits, including improved scalability, flexibility, and cost savings, increasing complexity has made it challenging for security teams to secure the data stored in these environments adequately.

AM, PAM, IGA and ADM: Key differences, and how to unify them

Identity management acronyms aren’t anyone’s idea of a fun day out, but successfully securing identities requires carefully stitching together each of these acronyms into a comprehensive identity security solution. In this article, we discuss AM, PAM, IGA, ADM – and how a unified identity platform (UIP) can help you tie them all together. Let’s start by defining each of these acronyms.