Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Baking a SIEM: A Recipe for Graylog Open to Security and Beyond

Aspire Bakeries' Graylog journey began in mid-2017 when we realized the current method of log review/collection on each device wasn’t working for us in Operations and we needed better way of working. Over the years we have grown our Graylog implementation from a single Graylog Open 2.0 VM for Operations Teams to a multi-node cluster handling 100MM+ messages per day and the center of our SOC.

Secure your container images with signature verification

The use of version control systems, continuous integration (CI), container services, and other tools in software development have enabled developers to ship code more quickly and efficiently. However, as organizations expand their build and packaging ecosystems, they also increase the number of entry points for malicious code injections that can ultimately make their way to production environments.

The Role of AI in Cybersecurity: Opportunities, Challenges, and Future Threats

As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Over the next several weeks their thoughts will be posted here, so please read on and stay tuned! As artificial intelligence (AI) continues to advance, its applications in cybersecurity will become more prominent and will spark conversations around its potential and its risks.

How To Speed Up Insider Threat Investigations With AI

Collecting forensics for Insider Threat investigations doesn't have to be a hassle. Learn how Teramind's platform makes it easy to speed up insider threat investigations so you prevent threats from causing major security incidents. Even better, our AI-powered OMNI platform presents potential risks in a News Feed-style format, so you can address the most pressing concerns before they happen.

BootKitty Bootkit - The 443 Podcast - Episode 315

This week on the podcast, we cover the first ever UEFI bootkit targeting Linux systems and what it means for evasive malware. After that, we give an update on whats being called "the worst telecom hack in US history" before ending with our analysis of a research post showing the latest phishing evasion techniques for malicious office documents. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

What's New in Tanium Asset - Tanium Tech Talks #112

Many customers depend on Tanium for fresh hardware and software asset data, and that's why we keep making it better. Folks tell us they like the reporting, the software inventory and usage, the integrations with ServiceNow and Flexera. And they always know it's going to be accurate and fresh. Well today we're going to give you a tour of the latest enhancements: You will not find this combination of data and speed anywhere else.

The API Security Toolbox: Gateways, WAFs, and API Protection Explained

API security is a requirement, not an option, but there’s a lot of confusion about what exactly API security is. With so many tools that claim to solve your API security challenges, how can teams make informed choices that align with their actual needs? In this webinar, we will break down the available tools, highlight their strengths and limitations, and offer guidance on selecting the best fit for your security needs. Join us to deepen your understanding of API security layers and learn strategies to effectively protect your API endpoints.