Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

The Most Commonly Mixed-Up Security Terms: Learn the Differences Between Asset, Threat, Vulnerability, and Risk

The cybersecurity landscape is complex enough without the lack of a common vocabulary. But, often, organizations use common security terms incorrectly or interchangeably. This leads to confusion, which leads to frustration, which can lead to something much, much worse. Something like a breach. Let’s take a moment, then, to review the four most commonly mixed-up and misused security terms in the cybersecurity world.

Devo: Aligning Business Goals with Cybersecurity Is Key to Protecting Enterprises

Security teams already face enough challenges. They don't need another one caused by the organization's failure to align business goals with the security team's work. Allie Mellen, Forrester cybersecurity analyst, will share survey findings - both promising and disturbing -about what happens when business and security goals are not aligned. Alain Sergile, Devo SciSec Director, will share how the lack of alignment between a business and its security operations center needlessly hinders the SOC's work.

Forward Networks: Case Study: How to Merge Clouds Post Acquisition

Following a significant acquisition, the IT department in a Fortune 150 company needed to merge their AWS cloud infrastructures and prepare for multi-cloud traffic while ensuring security policies were not disrupted, the network stayed in compliance, and customers were not disrupted. Being able to model their entire estate from on premises throughout the cloud made this herculean task possible. Senior Technical Solutions Architect Craig Johnson will demonstrate how they did this quickly and on budget.

Torq: Intro to Torq: What to Automate First in Your SOC

For most organizations, there isn't much debate about whether to incorporate automation across the business. From DevOps to self-serve IT help desks, automation has become a routine part of daily operations, and the SOC is no different. The greater challenge is knowing what to automate, and how to do it right. There are so many opportunities, many teams feel a sense of "choice paralysis"-feeling overwhelmed by figuring out where to start and what tools to incorporate, or far more daunting, determining who in the organization has the skillset to develop the automations.

A practical approach to Active Directory Domain Services, Part 7: Cybersecurity and AD

In the first six parts of this blog series, we laid the foundation for beginning to work with and manage Active Directory (AD). With the groundwork out of the way, it is now time to explore the relationship between cybersecurity and AD. Taking this series one step further, this blog provides an overview of which design considerations are important in securing your AD infrastructure against potential security breaches.

API security: 12 essential best practices to keep your data & APIs safe

If you don’t think API security is that important, think again. Last year, 91% of organizations had an API security incident. The proliferation of SOAP and REST APIs makes it easy for organizations to tailor their application ecosystems. But, APIs also hold the keys to all of a company’s data. And as data-centric projects become more in demand, it increases the likelihood of a target API attack campaign.

Interpol arrests thousands of scammers in operation "First Light 2022"

Law enforcement agencies around the world appear to have scored a major victory in the fight against fraudsters, in an operation that seized tens of millions of dollars and seen more than 2000 people arrested. Operation “First Light 2022”, running for two months from March 8 2002 until May 8 2022, saw 76 countries clamp down on organised crime rings behind a variety of scams, seizing criminal assets, and providing new investigative leads around the world.

GDPR privacy by default examples, privacy by design concepts

The General Data Protection Regulation, a GDPR, requires business entities to put appropriate technical and organisational measures in place and implement privacy-compliant procedures and processes. The need to implement the data protection principles is to guard the safety of customers’ default personal data and protect natural persons’ rights. This requirement leads to addressing the guide of data privacy by design and by default.

An Introduction to Windows Event Logs

The value of log files goes far beyond their traditional remit of diagnosing and troubleshooting issues reported in production. They provide a wealth of information about your systems’ health and behavior, helping you spot issues as they emerge. By aggregating and analyzing your log file data in real time, you can proactively monitor your network, servers, user workstations, and applications for signs of trouble.