Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Threat Intelligence 101

You can’t protect your system if you don’t know where the vulnerabilities lie or what aspects of your security architecture are being targeted by threats. Intelligence is everything in security — it’s how CISO’s make large-scale operational decisions, how IT teams prioritize projects, and how responders restore and remediate a system during and after an incident.

The Uber Hack - A step by step breakdown of the 2022 Uber data breach

On September 15th Uber suffered a significant breach. In this video, we will break down exactly how Uber was breached from initial access to how the attacker moved laterally into different internal systems of Uber. What happened? Here’s what we know so far, pending investigation and confirmation from Uber’s security teams.

ManageEngine: The top 5 correlation rules to master threat detection in your network

An effective SIEM solution should enable you to analyze events that happen in disparate parts of your network and correlate them as a single incident. This must be achieved through the use of both built-in and customized correlation rules. While built-in rules help you look for the most well-known threats, custom rules help you thwart attacks that may be of special concern to you. Join us in this webinar and learn how to use correlation rules to track these five security challenges.

Snyk in 30: AWS

Snyk partners closely with AWS to build tight integrations across the SDLC, helping AWS users secure their applications from their IDE all the way to production without impacting dev teams' speed and efficiency. Join this live democast and watch a Snyk security expert.

Netskope: Unlocking the potential of hybrid work

Hybrid Work - allowing your workforce to access the applications and data they need to do their jobs, from anywhere and anytime - isn't a new concept. While the last couple of years has seen a dramatic increase in the need for remote work all over the world, the rapid movement to cloud-based computing, and also hybrid work, meant this digital transformation was inevitable. Join our expert-led webinar as we discuss how network and infrastructure teams can build a better network for hybrid work, while collaborating with security teams to protect users and data everywhere.

How Identity Verification Technology can help replace passwords

Passwords are difficult to remember and have ever-more-complex criteria set by individual platforms. They are also the main culprits for data leaks. 85% of data breaches are caused by human mistakes, and credential compromise is a key contributing element, according to the 2021 Verizon Data Breach Investigations Report. With AI enabled technologies like Face ID, more and more companies and users are opting for Identity Verification over traditional password verification.