Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Validating Arctic Wolf's Incredible Voyage

One of my favorite books is “Endurance: Shackleton's Incredible Voyage” by Alfred Lansing. I encourage you to read it if you haven’t. Here is a brief synopsis of the true-to-life story: In August 1914, polar explorer Ernest Shackleton boarded his ship, the Endurance, and set sail for Antarctica, where he planned to cross the last uncharted continent on foot.

First-Party vs Third-Party Cyber Insurance: What's the Difference?

Often it's not a question of if your business will experience a data breach, but when. Hackers are always looking for new ways to take advantage of weak networks or trick employees into falling prey to their schemes. And if your business operates computer systems or handles sensitive data regularly, you are at risk. Having the right insurance coverage to provide aid in the event of a cyber attack can save your business from expensive lawsuits and reputational damage.

Review and Approval Workflows

Easily streamline collaborative procedures and perform document review and approval using Workflows in Egnyte. From the file preview, under the Workflows menu, you can add a one-step task, or a multi-step workflow for each stage of review, including final approval. For GxP domains, approval includes Part 11-compliant digital signatures. Collaborators are automatically notified when the workflow moves to a step they’re assigned to.

A buyers guide: What to consider when assessing a CASB with Hank Schless

All roads lead to Cloud Access Security Broker (CASB). Gartner found CASB to be the fastest-growing cyber security segment, with investment increasing by 41.2% (2021 CIO Agenda Survey). It's no surprise, as security teams turn to CASB to solve new cloud service-related challenges that legacy security solutions cannot address. Some key points in this presentation are.

MDR Provider, MSSP or Both? Focus on the Capabilities You Need

Over the last several years, Managed Security Service Providers (MSSP) have evolved, and some have started offering Managed Detection and Response (MDR) services as part of their overall security solution. However, an MSSP lacking MDR capability simply cannot provide the same level of security, particularly in today’s quickly changing environment that has seen remote and hybrid work become the norm.

Talking the End of Passwords with Friends and Family

Engineers worldwide have a tradition to look forward to every holiday season. You are taking in a sporting event on Thanksgiving Day when your uncle asks you why he keeps getting a message to update his iPhone; it’s only two years old. Or your grandma needs help with her hacked Facebook account.

What is a Security Operations Center (SOC)?

A security operations center (SOC) is a centralized facility that unifies an organization’s security monitoring across all IT infrastructure. SOCs function as a hub for information security personnel and the processes and technology needed to detect, monitor, and remediate cyber threats through real-time data analysis.

SANS 2021 Ransomware Detection and Incident Response Report

Ransomware attacks have become some of the most prolific and public intrusions over recent years. Within a matter of hours, organizations can go from normal operations to having an inoperable network and being extorted for tens of millions of dollars. On this webcast, SANS instructor and author Matt Bromiley, as well as sponsor representatives, will share their thoughts on modern detection and response techniques for ransomware breaches

Stopping IOT Attacks using NDR

Unmanaged endpoints like IoT devices represent a significant and growing risk surface. Network Detection and Response (NDR) solutions monitor network traffic to generate rich security evidence that enables asset inventory, vulnerability assessment and threat monitoring. In this presentation, experts from Corelight and Microsoft will walk you through how it works and how it can improve your security posture.