Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Create Instant, Scalable, and Cost-Effective Value for MSSP Customers

This blog was originally published on MSSP Alert on November 20, 2024. Imagine being able to offer your customers instant value for selecting your MSSP over others. This sounds like a tricky proposition, given that organizations seeking managed security solutions can be extremely diverse. What could a medical institution need that would also benefit an energy company? Where do the needs of a tech startup and a dairy farm intersect?

CVSS 3.1 vs CVSS 4.0: A Look at the Data

Like the cost of groceries and everything else, CVSS scores seem to have experienced some inflation recently. CVSS 4.0 promises to be a better calculator of risk than previous iterations of the system, but that’s only true if you use it in its full capacity to calculate your specific risk within your specific environment. Most of us aren’t using it that way.

John Graham-Cumming at WebSummit: Making security simple

In today’s modern workplace, employees connect from anywhere, often using both personal and company devices and a mix of managed and unmanaged apps to stay productive. This dynamic creates a patchwork of unsecured endpoints and raises the stakes for data protection. Cultivating a seamless security culture requires solutions that blend naturally with how people work. How can we make security behaviours effortless, so they become second nature, embedding safety at every level of the organisation?

John Graham-Cumming at Web Summit: Empowering developers - Focus on innovation, not infrastructure

More and more companies are moving away from traditional cloud architecture to envision a new cloud that's more specialised to individual workloads and data needs, but what does it take to build more personalised and streamlined infrastructure? Join Cloudflare CTO John Graham-Cumming as he explores the next generation of cloud architecture and breaks down how it will lessen developers' burdens.

What is ML-based monitoring and alerting?

Machine learning (ML) has significantly evolved since its conception in the 1950’s. One of the minds behind the technology and field of study was Alan Turing, a computer scientist and artificial intelligence (AI) pioneer. Turing famously challenged the expectations and limitations of computers by posing the question, “Can machines think?”

Simplify Network Management with a Single Source of Truth

Managing complex networks can feel like an endless challenge, especially when critical data is scattered across multiple tools and systems. Conflicting sources of truth (SOTs) introduce risks, leaving IT teams uncertain about which data to trust. Without an accurate view of your network, tasks like CVE management, troubleshooting, and compliance become overwhelming—and potentially introduce risk into the network.

A Guide to Domain Monitoring for Businesses

For many organizations, their online presence is not only critical to their commercial success but a key element of how they manage public perception. Yet from typosquatting to domain hijacking, authentic business websites are at significant risk of exploitation, with serious potential consequences. Domain monitoring enables organizations to defend against these types of threats by identifying potential issues early and taking effective action to mitigate the risks.