Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

How to Create Custom Cloud Security Posture Policies

Falcon Horizon, CrowdStrike’s Cloud Security Posture Management solution, uses configuration and behavioral policies to monitor public cloud deployments, proactively identify issues and resolve potential security problems. However, customers are not limited to predefined policies. This article will review the different options for creating custom cloud security posture management policies in Falcon Horizon.

What is the Most Vulnerable Data My Company Holds?

Data security is on every priority list in 2022. With the frequency of breaches never higher, many businesses assess their situation and ask cybersecurity questions. With cybersecurity policy, everything boils down to risk. Ultimately, every decision-maker wants to know, “how likely are we to be attacked?” Many believe cybercriminals only target certain kinds of data. Sensitive information, high-value financial data, and medical records are all widely accepted to carry a high risk.

Using Log Management as a Security Analytics Platform

With the rising tide of data breach awareness, your senior leadership is asking you to mitigate cybersecurity risk with security analytics. You’ve built up the use cases and started researching different platforms. Then, you realized: you’re not sure you have the budget. The typical security analytics platforms come with upfront technology costs as well as the “hidden fees” associated with training your team members. You know you need to use analytics to help mitigate risk.

Offensive Security | Cybersecurity Sessions #6 with Jonathan Echavarria

How can you really know what havoc hackers could wreak on your systems? By challenging them to do it and fixing the exploits they discover, of course. In this episode of the Cybersecurity Sessions, Andy finds out what it’s like to be on a ‘red team’ tasked with hacking into an employer’s own systems by any means necessary, with lauded offensive security practitioner Jonathan Echavarria (ReliaQuest).

Getting the best out of your SIEM

An effective SIEM solution ingests logs from different network sources to give visibility into user and host activities. It uses capabilities such as threat intelligence and behavioral analysis to set correlation rules to spot malicious activities within a network. This e-book will help you obtain the maximum value from your SIEM deployment by guiding you through 10 of the most critical capabilities capabilities.

1Password: The Heart of Cybersecurity Webinar Series: Pete Matheson

At 1Password, our goal is to keep everyone, everywhere safe as they go about their work and play. Our webinar series, "The Heart of Cybersecurity," aims to explore what's really at the heart of the complex world of cybersecurity: real people, solving real problems, and their extraordinary stories. April's session features Pete Matheson, mentor and coach to IT business owners. He frequently shares his thoughts and opinions on the latest tech announcements, security and privacy issues, and products you should know about on his website and YouTube channel.

Outpost 24: Live Webinar: Why API security matters and how to get it right

APIs are everywhere and now a critical part of any modern SaaS and web application. API security has become a critical priority because the nature of publicly available APIs give outsiders direct access to your application logic and data for potential abuse. In fact, Gartner predicts "by 2022, API abuses will move from infrequent to the most frequent attack vector, resulting in data breaches for enterprise web applications." Recent API attacks on Peloton, LinkedIn, and Clubhouse are good examples of the risk of vulnerable APIs in the real world.

WatchGuard: Elevating Your MSP Security Practice with a Unified Security Platform

You're tired of struggling with disjointed security information, incomplete integrations, and too much time and energy spent with multiple security vendors. These aren't minor headaches of a managed services business, they ultimately drain efficiency and profits, and many are considering vendor consolidation as the answer.

How to Meet Third-party Risk Requirements of NIST 800-161

The National Institute of Standards and Technology (NIST) has produced several publications addressing the different components of information technology security within the NIST 800 computer security series. Compliance across this entire NIST 800 series is expected for all internal and external service providers of government entities - such as the DoD federal agencies.