Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How secure is your UPSI as SEBI tightens its reins on Insider Trading?

In September 2021, the Indian Markets Regulator, Security, and Exchanges Board of India (SEBI) banned an employee of an Indian MNC headquartered in Bangalore and his counterpart, an employee of a leading Global information technology company from trading in stock exchanges till further orders. An impounding of illegal proceeds of 2.62 crore rupees were generated through insider trading activities. This is just an example of insider trading.

What Is Privileged Session Management and How Can It Help Secure Your Sensitive Data?

Privilege abuse is the top misuse-related reason for data breaches according to the 2021 Data Breach Investigations Report by Verizon. To mitigate the risk of data leaks and other incidents, it’s crucial to enhance the protection of critical assets and keep a close eye on the activity of privileged users. Yet it can become a real ordeal for an IT security manager not only to secure access to their organization’s servers but also to track and manage all privileged sessions.

92% of companies improve their cybersecurity by outsourcing

MSPs are playing an increasingly important role in organizations' cybersecurity. This is the key finding from our Pulse "Outsourcing Security" survey of more than 100 organizations worldwide: 88% of respondents are outsourcing their cybersecurity processes or tools, and the most common type of outsourcing agreements selected is through MSPs (55%).

Aw, HEC! Splunking Okta's Event Hooks with the HTTP Event Collector

This weekend I spent some time with Okta’s Identity Engine product, learning about various ways to integrate it with Splunk and other external systems. When I got to Okta’s Event Hooks feature, I exclaimed “Aw, HECk!” (actually I said something a little stronger) and banged my head against my old copy of "Log4J 4 Me and U - A Complete Guide" for a few hours trying to get Event Hooks sending data properly into Splunk’s HTTP Event Collector, or HEC.

Octiga Office 365 MSP DashboardOffice 365 Security

Octiga's main Office 365 security universal threat intelligence dashboard provides consistency for MSPs. It is a complete bird's eye view of all the risky events, baselines, reports, and mailboxes for each tenant. In addition, you can further dig into individual tenants to analyse various alerts and take in-app action for critical and dangerous events.

Deploy Office 365 Security Baseline in OctigaOffice 365 Security Best Practices

Office 365 security baselines help achieve a tailored desired state configuration through continuous monitoring & alerting. Octiga's intelligent baseline engine then guides you to implement Office 365 security best practices confidently. As a result, you'll be alerted of and remediate the issues for Office 365 tenants, groups or users within seconds!