Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What To Do If You Are A Victim of Cybercrime: The Anatomy Of High Profile Incident

Welcome to the latest episode of Razorwire, where we delve into the world of cybersecurity and the challenges faced by experts in the field. Our guests today, Joe Hancock, and Paul Hemmings, work together at Mishcon, and I’m delighted to be able to share their expertise with you today. We’re discussing high profile cybersecurity incidents and how they are handled by the experts.

Simplify Cyber Insurance (and Potentially Save Some Money) With Breach and Attack Simulation

Shifts in the threat landscape have caused cyber insurance providers to rethink how they offer and price their coverage. The result has been stricter underwriting requirements, more exclusions within coverage, and a dramatic increase in premiums. Tougher underwriting requirements have also put pressure on security and risk leaders to more thoroughly validate their security controls as enterprises are applying for, or renewing, their coverage.

Device Authority embraces transparency and international standards as the White House Names SBOMs as key pillar of Cybersecurity Implementation Plan

In a significant stride towards strengthening cybersecurity practices and protecting the nation’s digital future, the White House has issued a formal National Cybersecurity Implementation Plan, and named the 5 pillars that it believes are critical to successfully implementing its cybersecurity strategy.

Xalient's Partner Ecosystem - Simplifying and Improving your Technology Solutions

In today’s fast-paced digital landscape, businesses heavily rely on various technology solutions to drive their success. However, managing multiple point solutions can become overwhelming, often requiring different partners or Managed Service Providers (MSPs). At Xalient, we understand these challenges and have developed a robust partner ecosystem to simplify and enhance the technology experience for our customers.

Graylog API Security Intro Demo

Discover and Improve Your API Security with Graylog! In this quick demo, Rob from Resurface now Graylog, showcases how Graylog helps you understand and manage your API attack surface. From identifying Rogue, prohibited, and deprecated APIs to automatically discovering and summarizing common types of attacks and failures, Graylog streamlines API security. No technical expertise needed – the system categorizes API calls into meaningful buckets, providing detailed views, including full request and response details. Easily create custom signatures, export data, and receive alerts with Graylog's comprehensive API security solution.

Choosing the Right Managed Application Security Provider: A Guide

Imagine, if you will, that you are the esteemed ruler of a vast digital dominion, and your applications are the lifeblood of your realm. Yet, in the boundless expanse of cyberspace, there lurk dragons of the most fearsome kind—cyber threats, data breaches, and hackers. You require a champion, a Managed Application Security Provider (MASP), to safeguard your kingdom. But how, pray tell, does one select the right one?

Implementing workload-centric Web Application Firewall (WAF) using Calico

Microservices security is a growing concern for businesses in the face of increasing cyber threats. With application layer attacks being a leading cause of breaches, it’s more important than ever to safeguard the HTTP-based communication between microservices within a Kubernetes cluster. Traditional web application firewalls (WAFs) are not designed to address this specific challenge, but Calico WAF offers a unique solution.