Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Uncovering the dark web: What is it and who uses it?

The dark web is the seedy underbelly of the internet. Unlike the surface web, criminals, spies, freedom fighters, and hacktivists can operate anonymously on the dark web, making it a popular place for illicit activity. Legitimate internet users also use it to protect their privacy in a world where people are increasingly mistrustful of digital giants like Google and Facebook. But it’s very easy to accidentally view illegal, dangerous, and traumatizing material on the dark web.

I Get Paid to Hack Your Company and These Are the Controls I Hate the Most!

Carlos García and Jeff Macko, two leading security experts from Kroll, provide a unique perspective on hacking and how to address it in this insightful webinar, I Get Paid to Hack Your Company and These Are the Controls I Hate the Most! The session outlines the most effective security controls to prevent and mitigate common types of cyberattacks and emphasizes potential quick wins that can be achieved without the need for significant investment, and how to harness the technology already used by most organizations.

Navigating New Cybersecurity Policies and Regulations: What You Need to Know

2022 has brought in tighter cybersecurity restrictions and privacy regulations around the world. With the escalation of cyber threats due to the accelerated digital transformation and the Russian invasion of Ukraine, governments globally have made decisions to step up their cybersecurity defense and introduce new measures to protect businesses or national security.

Panther Labs CEO Jack Naglieri: How to make security operations painless

Today on the Future of Security Operations podcast, Thomas is joined by Jack Naglieri, CEO of Panther Labs, a cloud-native SIEM platform that alleviates the pain of traditional SIEM with detection-as-code, a robust security data lake, and huge scalability with zero-ops.

What is MFA (Multi-Factor Authentication)? Learn How it Works

Multi-factor authentication (MFA) is an authentication method that requires at least two forms of verification of the user’s identity to gain access to an account, application, or data set. Instead of needing just a username and password to log in, MFA adds additional layers of security by requiring users to verify their identity. Each additional verification method can prevent unauthorized access from cybercriminals or hackers from executing a successful cyber attack.