Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Chatbots for security and IT teams (Part 5): Microsoft Teams

This blog is a continuation of our series on working with chatbots leveraging Microsoft Teams. In Part 1 of this series, we examined how to set up a chatbot within Microsoft Teams. In Part 2, we explored how to send rich notifications using Cards and use the Microsoft Graph API and the chatbot to proactively find and contact users within Microsoft Teams.

How Auth0's engineering team tamed incident response with NoCode automation

No-code automation isn't just for non-technical users. Programmers have enough code to maintain as it is, so when they want to build an important workflow to improve how the team works, it's great to be able to skip all the baggage like logging, monitoring, persistence, backups, and deployments. Join Tines and special guest Dennis Henry, Sr. Engineering Manager at Auth0, as we dive into one such real use case – engineering incident response. When engineers are focused on triaging an issue, the last thing they should be worrying about is the tooling they are using to organize their response.

Netacea: The Bot Management Review: Separating Bot Fact from Fiction

Netacea surveyed 440 enterprise businesses in the UK and US and discovered that although businesses know bots are costing them millions of dollars, they share many common misconceptions about these threats. Can you spot the truth amongst these bot myths? We've assembled an elite squad of bot myth busters from Netacea and MalwareBytes Labs for a live webinar. Their mission is to get to the bottom of why these myths are so widely believed - and how businesses can move beyond the myths to protect themselves from the most malicious automated threats.

Trustwave: Lapsus$: The Latest Threat To Your Digital Supply Chain

The threat against your digital supply chain is real. The cybercriminal gang Lapsus$ burst onto the scene with unique compromise and data exfiltration tactics as well as atypical motivators. Lapsus$ has attacked several top enterprises including Okta, Microsoft, NVIDIA, Samsung. The group's approach to malicious operations takes a shortcut to access by recruiting insiders, while also pursuing more traditional routes like social engineering.

The one-stop solution for keeping your IT environment secure

Cyberthreats continue to evolve, causing trillions of dollars in losses. There will be a 76% increase in cybersecurity breaches by 2024, according to StealthLabs. A report by IBM states that it took an average of 287 days to identify and contain a data breach in 2021. According to Verizon’s 2020 Data Breach Investigations Report, 86% of cybersecurity breaches were financially motivated, and 10% were motivated by espionage.

ManageEngine AD360 and Log360 bag the 2022 Cybersecurity Excellence Awards

ManageEngine kicks off the year on a high note as it bags the 2022 Cybersecurity Excellence Awards under various categories. To name a few, ManageEngine has been declared a winner for AD360’s IAM and identity governance (IGA) offerings, Log360’s SIEM and SOAR solutions, and data-centric security.

How to Mitigate Risks in Software Supply Chain Security

In this session, Mic McCully and Jake Williams explore the software supply chain as an attack vector – by identifying risks and mitigation strategies throughout the software development processes and environment. Watch this to learn how you can meet new requirements and protect your software from these attacks. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

VPNs are increasingly common - how much can you see?

VPN tunnels are like shipping containers in that they are widely used (especially as the pandemic has moved more of the workforce to remote work), and they can be used to carry traffic for legitimate as well as malicious purposes. Establishing a tunnel between corporate offices, remote workers, or partners to transfer data is a legitimate and common use for VPNs.