Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Discord Cooperates with the Government in An Attempt to Learn About Recent Breach

Between January and March of this year, US government documents started being leaked online. These documents contain some valuable information, and the Department of Defense has been trying to determine the culprits behind the leaked documents.

KnowBe4 Named a Leader in the Spring 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

We are excited to announce that KnowBe4 has been named a leader in the Spring 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the eigth consecutive quarter! Based on 177 G2 customer reviews, KnowBe4’s PhishER platform is the top ranked SOAR software. PhishER has the highest market presence score among SOAR products with a score of 97 out of 100, with 98% of users rating it 4 or 5 stars.

Random but Memorable - Episode 10.6: Show Smart Passkey Support

Is this really the 'death of passwords'? ��🔤 Steve Won, Chief Product Officer at 1Password, jumps into the deep end on today's show. Tune in, as we cover all things passwordless, passkeys, and how 1Password is leading the way to a passwordless future. We also lift the lid on all the latest security news in Watchtower Weekly, and reveal the iconic Random but Memorable game you voted to bring back in our listener poll! 🥁🗳️

Detecting and mitigating ransomware using Endpoint Central.

Is your organization at risk of a ransomware attack? Don't wait until it's too late. With Endpoint Central's advanced anti-ransomware solution, you can detect and block intrusions in real-time, using our multi-patented technology and AI-assisted detection engine. Keep your data safe and prevent costly ransom payments with Endpoint Central's 24/7 threat detection and rapid response capabilities.

Pentagon Data Leak Shows the Danger an Insider Threat Presents

U.S. officials confirmed last week that a member of the military photographed and uploaded more than 50 classified documents to a Discord server and other social media sites, again reminding us of the danger insider threats can present to any organization. According to the Associated Press, a member of the U.S. Air National Guard was arrested last week in Massachusetts in connection with the leak.

10 Managed Security Services Benefits for Businesses To Know

Every day the world discovers (and creates) new problems in the field of information security. Fresh bugs randomly pop out of nowhere, someone develops brand-new malware, and insiders continue to leak confidential information leading to the closure of the businesses - so how do companies cope with all the chaos? And what to do if there is no feasible way to create a security department within the organization? Is it worth it or wise to outsource such a critical life-saving function? Maybe.

Threat Hunting vs Incident Response for Cyber Resilience

Protecting data and protecting business continuity are both similar and different. In a data driven world, your mission as a security analyst is to prevent threat actors from gaining unauthorized access to sensitive data and systems. Simultaneously, you also need to investigate incidents rapidly, ensuring that critical services experience as little downtime as possible.