Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Continuously Securing Software Supply Chain

Catch this session to see a breakdown of the recent news related to software supply chain security and what you can do to meet new requirements and protect your software from such attacks. With new software supply chain attacks reaching the spotlight at an accelerating pace, security research uncovering novel attack methods and new mandates and guidelines starting to come into effect — it can be hard to stay on top of the latest developments and their implications.

No BS security: detect and automate with LimaCharlie & Tines

Why is there so much BS involved in the building and selling of security software? The security stack of the future – and of today, in the best companies – is composed of tools that focus on doing one thing extremely well, with transparent value and pricing, packaged in a product that the team will actually enjoy using. Join Eoin & Maxime, the founders of Tines and LimaCharlie, as we explore why "No BS" is the future of security, and put our own products to the test: building an end-to-end sophisticated detection and response flow using the free, ungated versions of our products.

Protect Archived Data from Ransomware with Immutability for Amazon Web Services Cloud Storage

Protecting your data in the cloud is fundamental to your security posture in terms of business continuity and disaster recovery. While Rubrik customers utilize the cloud every day to safely store off-site copies of their data, this blog is going to explain how we’ve made that practice even safer! We know that security threats to backup systems are on the rise, with hacking, malware, and even human error becoming more prevalent in the age of remote work.

Monitoring Endpoint Logs for Stronger Security

The massive shift to remote work makes managing endpoint security more critical and challenging. Yes, people were already using their own devices for work. However, the rise in phishing attacks during the COVID pandemic shows that all endpoint devices are at a higher risk than before. Plus, more companies are moving toward zero-trust security models. For a successful implementation, you need to secure your endpoints.

5 Ways to Protect Your Website from Bot Attacks

Web scraping is the process of using tools such as crawlers and scraping bots to extract invaluable data and content from websites, read parameter values, perform reverse engineering, assess navigable paths, and so on. Global e-commerce businesses saw a drop of 2% in revenues, totaling 70 billion dollars, due to web scraping. This highlights the importance of effective web scraping protection.

Securing the Digital Supply Chain - Why are Investors interested in the digital supply chain

In this session for the Securing the Digital Supply Chain we talk to two very well known investors from Silicon Valley - Mahendra Ramsinghani (Secure Octane) and Cherian Mathew (Firebolt VC). We learn what drives the investment thought process for these two successful VCs and also hear what their perspectives are on cybersecurity, areas of interest, how to think about the market. Especially interesting are the thoughts on "Who gets affected" from a Digital Supply Chain perspective.

Getting the best out of Samsung Knox management with Mobile Device Manager Plus

In case you missed it, Samsung Knox has verified Mobile Device Manager Plus as a Knox Validated Partner solution. This means that our EMM solution meets its business-level requirements for 2022, and that we support a wide range of features to help you get the best out of all your mobile devices that support Samsung Knox capabilities.

When It comes to Cybersecurity - An ounce of prevention

So, to what extent are we able to protect ourselves from Cybersecurity events? With the alphabet soup of acronyms out there such as NIST, ISO, SOC, CISA, DevSecOps, etc…… protecting your business from Cybersecurity threats can be overwhelming. Making Cybersecurity a priority can save your business down the road. Threat Actors, once in, may lay dormant for months much like a human virus.

Power the SOC of the Future with the DataLinq Engine - Part 3

In my first blog in this three-part series, we discussed the importance of data to the modern SOC, and the unique approach of ThreatQ DataLinq Engine to connect the dots across all data sources, tools and teams to accelerate detection, investigation and response.