Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Root Cause Collaboration - Tanium Investigate - Tanium Tech Talks #125

Whether you are in IT operations or security, collaborating to close cases is a daily event. Tanium Investigate helps you get to root cause faster by collecting data points across endpoints, users, and teams. Get to root cause faster Reduce Mean-Time-To-Resolution MTTR Correlate artifacts across endpoints and users Reach endpoints anywhere in the world Integrate with ServiceNow ticketing Live process monitor (and kill processes) Browse the file system and tail log files Manage Windows services Browse Windows Event Logs Browse Windows Registry.

EP 6 - Incident Response POV: 2025 Emerging Threats

In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call.

Security Gone Mad: The Fine Art of Overdoing It

Cybersecurity or overkill? In this brilliantly unfiltered episode of Razorwire, James Rees is joined by security experts Iain Pye and Chris Dawson to debate when security controls cross the line from protection to pointless. From biometric data dilemmas to airport security absurdities, they dissect where cybersecurity goes wrong — and how to strike the right balance.

MDR vs. EDR: Which Solution is Right for Your Organization?

If your organization is considering a threat detection solution, chances are good that you are wondering about EDR vs. MDR. The constant evolution of the cybersecurity marketplace can make it difficult for organizations to understand the differences and capabilities between different types of security offerings.

The Role of Innovation in Building Resilient Business Models for 2025

Innovation isn't just a competitive advantage anymore-it's survival equipment for the turbulent business landscape of the 2020s. The past few years have taught business leaders a powerful lesson: disruption is no longer an occasional event but a constant reality. From global health crises to supply chain breakdowns, geopolitical tensions to technological revolutions-the only certainty is uncertainty itself. In this environment, traditional business models built on stability and predictability are increasingly vulnerable.

Security Threats to Payroll Data: How Can Your Firm Manage Them?

In modern, connected workplaces, security is a perpetual concern. Some departments in your organization handle high-risk information, such as personal employee data and company finances. Any data breach can bring on a reputational crisis and endanger internal strategic approaches. In February 2025, HR Dive reported the impact of a data breach at an employee screening services provider. The breach affected an unnerving 3.3 million people, leaking people's names and financial account information. Social Security numbers and other ID numbers also got compromised.
Featured Post

How Much Service Do You Need from DRaaS?

All Disaster-Recovery-as-a-Service (DRaaS) providers do the same basic thing: They manage the recovery of data and applications following an outage or cyberattack. The growing frequency of cyber-attacks highlights the importance of these services. Cloudflare, for example, mitigated $6.9 million DDoS attacks in Q4 2024, a 16% increase quarter-over-quarter and an 83% rise year-over-year.