Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar: How to Deliver a Modernized Network and Eliminate Aging Hardware - 24 Mar 2022

The average lifespan of a firewall or access point is five to eight years. What does this mean for MSPs who have customers with aging hardware? Join Product Manager Ryan Poutre and Product Marketing Manager Kayla Myrhow as they discuss the best practices to follow to deliver a modern network for our new way of working.

Chatbots for security and IT teams (Part 5): Microsoft Teams

This blog is a continuation of our series on working with chatbots leveraging Microsoft Teams. In Part 1 of this series, we examined how to set up a chatbot within Microsoft Teams. In Part 2, we explored how to send rich notifications using Cards and use the Microsoft Graph API and the chatbot to proactively find and contact users within Microsoft Teams.

How Auth0's engineering team tamed incident response with NoCode automation

No-code automation isn't just for non-technical users. Programmers have enough code to maintain as it is, so when they want to build an important workflow to improve how the team works, it's great to be able to skip all the baggage like logging, monitoring, persistence, backups, and deployments. Join Tines and special guest Dennis Henry, Sr. Engineering Manager at Auth0, as we dive into one such real use case – engineering incident response. When engineers are focused on triaging an issue, the last thing they should be worrying about is the tooling they are using to organize their response.

The one-stop solution for keeping your IT environment secure

Cyberthreats continue to evolve, causing trillions of dollars in losses. There will be a 76% increase in cybersecurity breaches by 2024, according to StealthLabs. A report by IBM states that it took an average of 287 days to identify and contain a data breach in 2021. According to Verizon’s 2020 Data Breach Investigations Report, 86% of cybersecurity breaches were financially motivated, and 10% were motivated by espionage.

ManageEngine AD360 and Log360 bag the 2022 Cybersecurity Excellence Awards

ManageEngine kicks off the year on a high note as it bags the 2022 Cybersecurity Excellence Awards under various categories. To name a few, ManageEngine has been declared a winner for AD360’s IAM and identity governance (IGA) offerings, Log360’s SIEM and SOAR solutions, and data-centric security.

How to Mitigate Risks in Software Supply Chain Security

In this session, Mic McCully and Jake Williams explore the software supply chain as an attack vector – by identifying risks and mitigation strategies throughout the software development processes and environment. Watch this to learn how you can meet new requirements and protect your software from these attacks. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

VPNs are increasingly common - how much can you see?

VPN tunnels are like shipping containers in that they are widely used (especially as the pandemic has moved more of the workforce to remote work), and they can be used to carry traffic for legitimate as well as malicious purposes. Establishing a tunnel between corporate offices, remote workers, or partners to transfer data is a legitimate and common use for VPNs.

A lasting trend: As a Service

With budgets tightening across the board and competition for a limited pool of IT and security talent growing fiercer, cyber as a service providers have become an optimal solution for many companies. Knowing they can count on their partners to focus on specific vectors, internal security teams can concentrate on their core missions. This could be high priority or critical items within security or something totally outside of security.