Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Benefits of Integrating PAM With SIEM Solutions

Integrating Privileged Access Management (PAM) with Security Information and Event Management (SIEM) solutions offers many benefits for organizations, including enhanced threat detection, improved visibility, reduced risk of insider threats, simplified compliance and more. Continue reading to learn more about the benefits of integrating PAM with SIEM solutions and best practices for integrating the two.

Best Practices For Responding to Privileged Access Requests

Organizations are prioritizing a Privileged Access Management (PAM) strategy to prevent cybercriminals from accessing privileged accounts and conducting malicious activities. A key component of this strategy is securely managing privileged access requests and ensuring that access is granted only when necessary, properly authenticated and monitored in real time.

Aligning With the Latest Cybersecurity Executive Order

On January 16, 2025, an Executive Order 14144 was issued, aimed at strengthening the nation’s cybersecurity defenses. This order comes at a crucial time – during the fiscal year 2023, U.S. federal agencies reported over 32,000 cybersecurity incidents, reflecting a 5% increase from the previous year.

Random but Memorable - Episode 14.2: Microphone Sharing Browser Fans with Vivek Ramachandran

What’s GhostGPT? This episode, we unpacked the new cybercrime AI being used by hackers. We also serve-up our best tips for secure tax-filing to help you survive tax-season in. If that wasn’t enough, we also invite Founder of SquareX, Vivek Ramachandran, to teach us how we can easily find and eliminate browser security risks. Hit play to find out how the browser landscape has changed in recent years, and how SquareX can help detect and mitigate new and traditional web attacks.

Top Cyber Threats Facing Manufacturing and How To Mitigate Them

The top cyber threats facing the manufacturing industry are ransomware, supply chain attacks, insider threats, phishing and social engineering attacks. In 2023, the manufacturing sector accounted for 25% of all cyber attacks, making it the most targeted industry. As the manufacturing industry increasingly relies on the Internet of Things (IoT) to improve efficiency and productivity, addressing security risks has become essential.

Exploring the unlikely relationship between hackers and the state with Emily Crose

Emily Crose, a veteran cybersecurity professional at agencies including the CIA and the Department of Homeland Security, had a question: How did hackers – a “weird” group of outsiders (herself included) – become sought-after collaborators with governments?