Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Unlocking the Potential of GRC Tools: A Path to Strategic Risk Management

By James Rees, MD, Razorthorn Security In today’s complex cybersecurity landscape, Governance, Risk and Compliance (GRC) tools have become essential for organisations managing intricate security ecosystems. These tools are designed to centralise information, streamline processes and offer crucial insights into an organisation’s risk posture. However, as cybersecurity expert Jack Jones revealed when he joined me on a recent podcast, the reality often falls short of these ambitious claims.

Reducing False Positives in API Security: Advanced Techniques Using Machine Learning

False positives in API security are a serious problem, often resulting in wasted results and time, missing real threats, alert fatigue, and operational disruption. Fortunately, however, emerging technologies like machine learning (ML) can help organizations minimize false positives and streamline the protection of their APIs. Let's examine how.

From on-prem to cloud: Detect lateral movement in hybrid Azure environments

There are several tactics that threat actors can use to access cloud environments, services, and data. A common example is lateral movement, which involves techniques that enable a threat actor to pivot from one host to the next within an environment. This type of activity often uses other tactics, such as initial access and privilege escalation, as part of a larger attack flow.

Prescribing Strong API Security: A Lifeline for Healthcare Data

In 2024, healthcare organizations face heightened security challenges, mainly as they increasingly rely on Application Programming Interfaces (APIs) to support critical functions. APIs have become indispensable in driving digital transformation and improving operational efficiencies across healthcare systems. However, the rising complexity and volume of APIs, alongside insufficient security practices, have created a vulnerable environment ripe for exploitation.

Beyond Burnout: Key Takeaways from SOC Analyst Appreciation Day 2024

Feeling overwhelmed by alerts? You’re not alone. At SOC Analyst Appreciation Day (SAAD) 2024, we heard from countless analysts facing the same challenges of burnout, perfectionism, and the need for mentorship. With a fantastic line-up of speakers, including John Hammond, Ron Eddings, Peter Coroneos from Cybermindz, and other security leaders, this year’s event provided valuable insights and sparked engaging discussions.

Introducing Passphrase Capabilities on Android

To generate a passphrase for a new or existing record on Android, tap the dice icon, select the dropdown menu next to “Type” and select Passphrase. You can customize your passphrase by setting the length, including capitals and numbers in the passphrase, and choosing from various symbols to separate the words. Passphrases can be up to 20 words long, with a minimum length of 5 words and each word including at least 3 characters. Check the box if you'd like to make your selections the default setting for all passphrases moving forward. Tap Use Passphrase or Copy Passphrase when you are done.