Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

NYSE Floor Talk with Judy Shaw ft. Torq CEO and Co-Founder, Ofer Smadari

NYSE Floor Talk with Judy Shaw ft. Torq CEO and Co-Founder, Ofer Smadari Ofer Smadari, Torq’s CEO and Co-Founder joined Floor Talk with Judy Khan Shaw to talk about Torq’s momentum from our $70M Series C and what sets Torq Hyperautomation apart from legacy technology.

API Security Essentials: What You Must Know About Positive and Negative Models #apisecurity #api

In this video, we dive into the fundamentals of API security by comparing two key security models: Positive and Negative. Learn how each model works, their pros and cons, and how to choose the right one to protect your APIs effectively.

Tanium Podcast | Pair real-time data with autonomous power with Tanium Automate

“What level of automation are we talking about here? I mean, because I still won't get in a car that doesn't have a human at the wheel.” With Tanium Automate, you can codify (and simplify) complex manual security tasks, saving time, reducing errors, and yes, keeping a human at the wheel. HOST: Doug Thompson, chief education architect, Tanium GUESTS: Steven Yang, director of product management, Tanium.

How we use Datadog for detection as code

Detection as code (DaC) is a methodology that treats threat detection logic and security operations processes as code. It involves applying software engineering best practices to implement and manage detection rules and response runbooks. This approach addresses many of the pain points associated with traditional security operations.

NIST: Time to end expiring passwords

Passwords are bad, and our whole industry is trying to move away from these simple strings granting access to our systems. But change is slow, and adopting newer standards is difficult, even if passwords are deeply problematic. Now, the National Institute of Standards and Technology (NIST) is updating the core standard for authentication – and it adopts the “new school” of password policies.

Penetration Test Point of Contact: Ensuring Effective Security Coordination

In today's complicated digital world, cyber threats are always coming at companies. Organizations need to do regular penetration testing to find security holes and evaluate their security stance in order to protect their valuable assets and keep their operations running smoothly. Having a named penetration test point of contact (PTPOC) is a key part of any penetration test that goes well.

Australia Enacts Landmark Cybersecurity Legislation: The Cyber Security Bill 2024

On October 9, 2024, the Australian government took a significant step in fortifying its cyber defenses by introducing the Cyber Security Bill 2024 to Parliament. This pioneering legislation marks the country's first standalone cybersecurity law, designed to enhance protections for both citizens and organizations amid escalating geopolitical and cyber threats. By implementing comprehensive measures, Australia aims to safeguard critical infrastructure and ensure a more secure digital environment.

Massive AI Call Center Data Breach: 10 million Conversations Leaked, Heightening Fraud Risks

In a significant breach, over 10 million customer conversations from an AI-powered call center platform in the Middle East have been exposed. This incident has raised alarm bells regarding the security vulnerabilities of AI platforms widely used in sectors such as fintech and e-commerce. As AI platforms become integral to business operations, the risks of compromised data tracking and brand impersonation have also escalated.

Outlook Bug Causes Global Disruptions: Microsoft Investigates Login Failures and High Memory Usage

Microsoft is currently investigating a significant issue affecting its Outlook desktop app, with users experiencing a range of problems, including crashes, high memory consumption, and login failures. Initially believed to impact only European users, the issue has now been reported by users globally, signaling a more widespread problem. In addition to the desktop app, some users have experienced similar issues while using Outlook on the web (OWA), making this a pressing matter for Microsoft to address.