Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

ThreatQ Announces Online Event Focused on the Critical Aspects of Threat Intelligence

Senior cybersecurity leaders are invited to a week-long event focused on critical aspects of threat intelligence management, featuring prestigious guest speakers alongside ThreatQuotient executives.

5 Key Benefits of Modern Identity Solutions for Your Business [Webinar]

In this exclusive miniOrange webinar, we explore the key advantages of modern identity solutions tailored for various industries. Our experts discuss how Identity and Access Management (IAM) and Privileged Access Management (PAM) can enhance security, improve user experiences, and streamline processes for businesses. Topics Covered: Don't forget to like, comment, and subscribe for more informative webinars and updates. If you have any questions or need further information, feel free to reach out to us at idpsupport@xecurify.com.

Threat Actors Zero in on Retailers as the Holiday Shopping Season Approaches

Trustwave SpiderLabs on October 29 will launch its second deeply researched look into the threats facing the retail sector. The 2024 Trustwave Risk Radar Report: Retail Sector will cover in detail the threats facing the industry, the most prominent adversaries in the field, and the commonly used methods to attack retailers. The main report is supported by two supplementary pieces.

CrowdStrike + Fortinet: Unifying AI-Native Endpoint and Next-Gen Firewall Protection

In today’s fast-evolving cybersecurity landscape, organizations face an increasing barrage of sophisticated threats targeting endpoints, networks and every layer in between. CrowdStrike and Fortinet have formed a powerful partnership to deliver industry-leading protection from endpoint to firewall.

Falcon Foundry: Build Custom Apps to Solve Tough Security Challenges

Not all security operation centers (SOCs) are equal. They have teams of different sizes, with varying skill levels, protecting a wide range of industries around the world. However, they have a few things in common — for one, they face many of the same threats, and many SOC teams struggle with the complexity of managing several disparate tools to detect and disrupt them. As the cybersecurity industry matures, SOC teams have more options to consolidate the security tools they use.

The Past, Present, and Future of File Integrity Monitoring

Also known as change monitoring, File Integrity Monitoring (FIM) solutions monitor and detect file changes that could indicate a cyberattack. They determine if and when files change, who changed them, and what can be done to restore files if those changes are unauthorized. As such, FIM solutions are useful for detecting malware and achieving compliance with regulations like PCI DSS and are a crucial part of any enterprise security stack.

A trainer's take: "Training alone won't change behaviours"

I've spent over 35 years as a trainer in various capacities, so it might surprise you to hear me say that training alone isn't enough to change behaviours—particularly when it comes to security. This isn't just my opinion; it's a conclusion from our State of Human Risk Management in 2024 Report. To understand why training isn't the full solution, we need to delve into the field of human error. Mistakes—errors caused by wrongly applied knowledge—can often be corrected with training.