Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Anomaly Detection in Cybersecurity for Dummies

One of the best ways to defend against both internal and external attacks is to integrate anomaly detection, a.k.a. user and entity behavior analytics capabilities, into your security analytics solution. In this e-book, we break down the different types of security anomalies and explain what each one looks like. We also explain how to determine the risk score of every user and host in the network. Finally, we cover five ways in which you can harden your defenses with anomaly detection.

Crossword Cybersecurity Plc acquires threat intelligence company, Threat Status Limited

Crossword Cybersecurity Plc is pleased to announce its acquisition of the whole of the share capital of Threat Status Limited, the threat intelligence company and provider of Trillion™, the cloud based software as a service (SaaS) platform for enterprise-level credential breach intelligence has now completed.

Why SASE is your best bet to secure a remote workspace

The origins of Secure Access Service Edge (SASE) can be traced back to 2019, when legacy network security systems were extensively used in workspaces. Gartner defined SASE as the combined deployment of cloud-based cybersecurity functions, including Firewall as a Service, a cloud access security broker (CASB), a secure web gateway (SWG), Zero Trust network access (ZTNA), and software-defined WAN (SD-WAN).

Banish Shadow IT With Digital Footprint

It’s out there. In the deep, dark corners of your IT estate, it’s been hiding. Maybe it’s that “killer app” one of the department heads brought back from a trade show. Or maybe it’s that campaign microsite that marketing had a contractor develop for a “skunkworks” launch. Shadow IT is more than an asset management problem. It’s a security problem because you can’t secure what you can’t see.

Build a software bill of materials (SBOM) for open source supply chain security

More than ever, developers are building web applications on the foundations of open source software libraries. However, while those libraries make up the software bill of materials (SBOM) components inventory, not all developers and business stakeholders understand the significant impact on open source supply chain security that stems from including 3rd party libraries.

What Is a SIEM Use Case for Compliance and Security Risk

Due to rising trends and policy changes, organizations are opting for solutions that ensure a proactive measure of cybersecurity. Companies are being held to much higher standards on how they collect, store, and protect individuals’ data. So they are searching for solutions that are both cost-effective and accurate. SIEM software provides threat management along with a detailed and centralized view of enterprise security.

This Is the Reason Behind 70% Of Data Breaches

70% of the data breaches involve the negligence of a 3rd party. Let’s understand this with Target’s classic example. In 2013, they were using a contractor, Fazio, to do maintenance of their air conditioning systems. The hackers got into the Fazio systems and used it as a jumping pod to infiltrate and hack into Target’s infrastructure. Big companies like Audi and Volkswagen have also suffered such cyberattacks due to 3rd party negligence.