Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mastering Cybersecurity Challenges: How Crisis Simulations Empower Organizations to Defend Against Cyber Threats

Cyberattacks are a constant and evolving threat across all sectors with 2023 seeing a resurgence in data breaches and ransomware attacks with popular variants like Clop, LockBit, and ALPHV, among others, terrorizing businesses and exploiting system vulnerabilities. The 2021–2022 financial year saw an increase in cybercrime, with over 76,000 reports made to the Australian Cyber Security Centre (ACSC), with no signs of slowing down.

How to Choose the Best Website Penetration Testing Tool?

What makes a good website penetration testing tool? Speed, agility, efficiency, or cost benefits? How about all of them? Hackers use automated tools to scan websites and apps before manually trying to exploit security loopholes. As the first step towards securing assets, you should do the same – only with better resources and before them.

Small Screens, Big Risks: Falcon for Mobile Releases New Innovations to Accelerate Detection and Response for Mobile Threats

Mobile devices have become critical endpoints for accessing enterprise applications, systems and data. Adversaries know this all too well, as evidenced by the growing numbers of attacks that target mobile devices. Verizon’s 2022 Mobile Security Index found almost half (45%) of enterprises had recently suffered a mobile-related compromise involving devices in the last 12 months — almost double the amount compared to the year prior.

Friday Flows Episode 11: Respond to & configure Terraform Cloud run task

The question of the week from a customer was: “How do we use Tines with our Infrastructure-as-Code methodology?” Today we’re looking at how to automate processes around Terraform Cloud, like documentation, opening tickets, and getting approval for changes in the cost of the infrastructure. Use this workflow to save time, maintain consistent records for audits, and manage incremental infrastructure costs.

Detect malicious files with BinLib: a private binary library

We’ll look at one of LimaCharlie’s newest features: Binary Library, or “BinLib”, a private repository of binaries observed in an organization. BinLib opens up new opportunities for detecting malicious files within an organization. Historical searching and YARA scanning allow you to take your binary detection to the next level, as we will observe and discuss in this session.

Essential Eight Compliance: Key Metrics To Track

‍Cybersecurity has become crucial for businesses and government entities in today's ever-changing digital landscape. While various frameworks and guidelines are available, the Australian Signals Directorate's "Essential Eight" is an effective and practical approach to strengthening an organization’s security against cyber attacks and threat actors.

Vendor Offboarding: Best Practices for Ensuring Security

When organizations hear “third-party risk management,” they often consider the processes needed to mitigate risks when working with a third-party vendor. These can include procurement risks and risks associated with starting new vendor relationships, often referred to as "onboarding,”—but what about when a working relationship ends?