Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A game of nations - How nation-states prepare for cyber threats with Locked Shields

This blog is the first post of a two-part series. Part 1 talks about the concept of a nation-state and then provides a high-level overview of Locked Shields — the world's largest cybersecurity exercise — and its increasingly important role in promoting cyber warfare readiness for NATO member states and partners. Part 1 also outlines the steps taken by nations to prepare for a cyber warfare exercise.

Tines Technical Advisory Board (TAB) Takeaways with Pete: part one

I’m Peter Wrenn, my friends call me Pete! I have the pleasure of being the moderator of the Tines Technical Advisory Board (TAB) which is held quarterly. In it, some of Tines’s power users engage in conversations around product innovations, industry trends, and ways we can push the Tines vision forward — automation for the whole team. Well, that’s the benefit to our customers and Tines.

Explore the ONE Security Platform for MSPs

As cyberattacks and the overall threat landscape grow more complex, managed service providers (MSPs) need to evolve. As an MSP, you must be capable of protecting customers from attacks targeting networks, devices, and users. Finding ways to protect your customers’ expanding threat surface is one thing, but doing so without compromising on operational efficiency or profitability is another. At times this can feel like an insurmountable task.

6 Reasons Cyber Security Is Important for SEO

In today’s digital landscape, the importance of cyber security cannot be overstated. With the ever-increasing frequency of cyber threats, protecting sensitive data has become a priority for individuals and businesses. In search engine optimization (SEO), cyber security is also important. Google and users are more likely to trust websites that provide measures against common cyber security threats. Therefore, website owners with proper security systems can expect higher Google rankings.

New look, who dis? LimaCharlie's brand evolution.

Today we are launching an evolution of the LimaCharlie brand as part of our refreshed identity. The intention of this post is to simply let you know about the change, so you won’t be surprised when things coming from us look a little different. Similar to our introduction of the SecOps Cloud Platform, this evolution of our logo and brand is not driven by change for the sake of change.

Seven Idaho Colleges Suffer Breaches: Students and Staff Impacted

Idaho is home to many popular universities that serve millions of students annually. Seven of the schools in Idaho were recently impacted by a data breach that resulted in a substantial amount of lost information. The vulnerable parties state that they're secure now, but a significant amount of data has already been lost to the attackers. Learn more about the stolen data and the schools involved in this attack.

Monitoring Networks with Snort IDS-IPS

Networks are the data highways upon which you build your digital transformation infrastructure. Like interstate highways transmit goods, networks transmit data. Every connected user and device is a network digital on-ramp. When malicious actors gain unauthorized access to networks, organizations must detect and contain them as quickly as possible, requiring security analysts to embark on a digital high-speed chase.

Understanding GitGuardian Roles and Teams

GitGuardian makes it easy for teams of any size to manage code security. We also make it simple to manage access to the GitGuardian dashboard as your security team grows and you need to assign roles and permissions. In this video, we will take a closer look at the various Workspace member roles. We will also explore how to create and manage Teams, allowing you to group users and incidents, as well as give users more fine-grained permissions.

Top Five Password Security Tips

The most important tips for password security include choosing long, complex, unique passwords, not storing them in easy-to-hack places and using a password manager. Unfortunately, most people don’t follow best practices for password security. According to Keeper Security’s 2023 Password Management Report, only 25% of people use strong, unique passwords for all of their accounts. That means 75% of people have insufficient password practices.

Don't just shift left, level up: Building a modern cyber defense program

Within the security community of late, the focus has been on “shifting left”, and while that has merit, it is somewhat myopic missing some of the realities of defense in practice. Instead, I propose a simple framework to help guide initiatives that will “level up” defenses and greatly improve security postures wholistically. Some license is taken in terminology in order to keep things simple, memorable, and applicable.