Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Splunk

Authentication vs. Authorization

Authentication and authorization are two key processes that ensure only trustworthy and verified users can gain access to authorized system resources and data. They enable your organization’s information security — your ability to protect sensitive information against unauthorized access. Although these two processes are used interchangeably, they have several fundamental differences.

How Digital Fingerprinting Tracks, Identifies & Affects Us

At one time, the internet was seen as a place where users could remain anonymous: they could scroll from the privacy of their screen. Today, we know that’s no longer the case. In an attempt to sell more products, and create a personalized digital experience, tech firms, companies and advertisers track and analyze each user across the digital landscape. Privacy is still important to users: 90% of individuals in a recent global survey said online privacy was important to them.

Getting Started with SOAR in Mission Control

This video will take a new or existing user of Splunk Mission Control through the process of implementing SOAR playbooks within Mission Control. Splunk Product Manager Kavita Varadarajan will walk you through the necessary steps and configuration to deploy a SOAR playbook at a basic level. Learn how to fully leverage the full power of orchestration and automation to unify your security operations with Splunk Mission Control.

Application Vulnerability Management: The Complete Guide

Enterprise software applications are sophisticated, incorporating various technologies and featuring complex integrations with third-party software applications and systems. Any security vulnerability in software components can bring severe consequences to the organization. That’s why it is critical to effectively manage application vulnerabilities. This article explores application vulnerability management, discussing its importance and best practices.

Patch Management Explained: Challenges, Best Practices & Steps

Patch management is the centralized control and automation of the patch deployment process — deploying patches — to multiple devices, operating systems, firmware, software and hardware endpoints in the IT network. But vulnerabilities are increasing at unseen rates. Over 65,000 new vulnerabilities in existing IT systems were discovered in 2022, which is a 21% increase from 2021. And that makes patch management all the more important.

Coffee Talk with SURGe: the Interview Series featuring Scott Roberts

Join Mick Baccio and special guest Scott Roberts, head of threat research at Interpres Security for an interview about Scott's career journey, how he's seen cybersecurity evolve over time, and his essay featured in the SURGe team's new book, Bluenomicon: The Network Defender’s Compendium.

A Vision for the Future of Cyber

Lately I’ve been confronted more and more with the notion of holding two opposing ideas at the same time, while being able to accept that they can both be true. This cognitive dissonance surfaced again for me when I was asked to participate in a DeVry University roundtable discussion focused on innovative ways to bridge the talent gap. Spending a virtual lifetime in education, I’m of two minds when it comes to talent and skills.

The RCE Attack Guide: Remote Code Execution & Prevention

Attackers use remote code execution as a way to gain unauthorized access, perform data breaches, disrupt services and deploy malware. Here’s how you can prevent your organization from RCE attacks: Let’s dive deep into remote code execution and, importantly, its prevention techniques.

Don't Get a PaperCut: Analyzing CVE-2023-27350

PaperCut NG is a popular print management software that has 100 million users at over 70,000 organizations around the world. Recent discoveries have unveiled critical vulnerabilities in this widely-used software, specifically the CVE-2023-27350 authentication bypass vulnerability. This vulnerability, if exploited, allows an attacker to execute arbitrary code with elevated privileges on a target system.