Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Run Faster, Runtime Followers

Recently, there has been a flurry of announcements claiming to have what we call Runtime Insights, the ability to prioritize vulnerabilities. Here are two examples: I can confirm that this approach works, and it works very well. It substantially decreases the number of vulnerabilities that a team has to manage, sometimes by a factor of 100 or more! How do I know it? Because Sysdig invented this approach.

The Devo Platform: An Integrated SaaS SIEM | SOAR | UEBA | AI Solution

People or AI? YES. Is your organization equipped to handle today's and tomorrow’s threats with your existing security team or with artificial intelligence? The answer is YES. Yes, to both of them. Yes, to all of it. Whether it’s dealing with the constantly evolving threatscape or the shortage of affordable, available cyber professionals, leadership needs to fill the gap with people and AI. It’s not either/or.

Simple. Fast. Easy. How Deployments Should be.

Getting started with new security tools can be a huge headache for organizations. Think about your last implemented security solution — how long did it take to make sure your business was 100% onboarded with maximum confidence? In this episode, we’ll show you how CrowdStrike enables you to onboard thousands of endpoints in minutes with full peace of mind.

Understanding the Intelligence Cycle for Cybersecurity: Building a New ICT Infrastructure

In this video, we dive into the intelligence cycle specifically tailored for cybersecurity. With a focus on protecting digital assets, we explore the stages of Direction, Collation, Analysis, and Dissemination within the context of building a new ICT infrastructure. Starting with the initial direction, we discuss the need for a secure network architecture capable of defending against cyber threats.

Mastering Cyber Security The Sun Tzu Approach

Progress your cyber security career with our masterclass from James Rees, MD of Razorthorn Security. In part 1, we take a deep dive into one of the oldest and most highly regarded texts in history - Sun Tzu's "The Art of War" - to uncover valuable insights for information security professionals. We can't stress enough just how useful this text is for anyone in the field, and if you haven't had the opportunity to read it before, we highly recommend doing so.