Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Outpost 24: Webinar: Why asset discovery is the missing link to your enterprise vulnerability management

There are noted differences in vulnerability management for enterprises. With more business units and a much higher risk of shadow IT and cloud sprawl, larger enterprises continue to suffer from the lack of asset visibility and classification to drive effective remediation, even when vulnerability assessment is done continuously.

Outpost 24: DevOps to DevSecOps Webinar: Delivering quality and secure development from the start (EMEA)

DevOps infrastructure that is agile, easy to deploy and scale up is the gold standard for many application developers, however, it can be increasingly complex. With many DevOps programs facing higher risk of cyber-attacks and data breach as security is often left out and not integrated into the SDLC workflow from the beginning.

Outpost 24: Mapping Vulnerabilities with the MITRE ATT&CK Framework (EMEA)

Threat actors are constantly evolving their tactics and techniques behind the scenes to target new flaws in the attack lifecycle and infiltrate company infrastructure. While most organizations are already performing vulnerability management based on the CVE registry by MITRE, few have considered the powerful correlations between CVEs and another of their useful resources - the MITRE ATT&CK® framework.

Outpost 24: Live webinar: Enhance user security to stop the cyber-attack cycle

Ransomware and phishing have become big business. Remote and hybrid working has increased the opportunity for cybercriminals to manipulate users who sit away from the safety of the office firewall. With an ever-expanding attack surface and the need to protect all networks, applications, clouds, and devices - identity and user awareness has become the first line of defense against cyber-attacks.

Outpost 24: Live webinar: Beating Hackers at Their Own Game - 2022 Cyber Security Predictions

Since the pandemic we've seen organizations struggle with the growing security challenges associated with digital transformation, distributed IT and workforce. Data and critical assets are everywhere, making it more difficult to assess and address. All of this fueled the spread of ransomware and sprang fear amongst even the most immovable board rooms - as no one is safe. This year, it became more and more apparent that organizations must take back control and refocus on building security resilience in order to get ahead of the cyber dystopia.

Outpost 24: Live webinar: How to protect your organization from credential theft

Cybercriminals love leaked credentials and can often appear on the dark web as valuable loot as a result of a data breach of an application's database. It's becoming more common and challenging for security pros to prevent credential leakage thanks to the large volume of applications and lack of actionable threat intelligence linked to your organization to apply the correct security controls.

Outpost 24: Five steps to build a continuous Application Security Program

Web applications are becoming increasingly difficult to secure. While organizations invest and rely heavily on penetration testing to detect and mitigate vulnerabilities, the traditional approach doesn't measure the overall security posture or breach readiness, because of the time gap in between pen tests (for web apps you know) and a lack of visibility over internet exposed assets (and those you don't know existed and didn't test).

Redscan: Protecting against Windows vulnerabilities: the top risks you should know about

Vulnerabilities in Microsoft's Windows Operating System continue to be amongst those most commonly exploited by cybercriminals. Join this Redscan webinar to hear from Jed Kafetz, Senior Security Consultant, and learn about the Windows exposures which pose the greatest risks to your business and what you can do to address them.