2021: The Year SOCs Embrace Cybersecurity Convergence

Staying on top of cybersecurity risk can feel like a losing battle in today’s modern, hyperconnected reality. The influx of IoT devices and increased reliance of BYOD devices has created a diverse, complex threatscape rife with overlapping vulnerabilit… Continue reading 2021: The Year SOCs Embrace Cybersecurity Convergence

Aproveche la IA y el análisis predictivo para recortar costos y eliminar inactividades

Con la promesa de un potencial sin precedentes, la inteligencia artificial (IA) y el análisis predictivo han permeado cada campo de las compañías. Debido a su capacidad de ayudar al personal minorista a servir mejor a los clientes, personalizar recome… Continue reading Aproveche la IA y el análisis predictivo para recortar costos y eliminar inactividades

The Data Lakehouse Post 1 – My Database Wishlist – A Rant

In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to … Continue reading The Data Lakehouse Post 1 – My Database Wishlist – A Rant

Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable

An enterprise’s inability to detect cyber attacks has tangible effects on its productivity and profitability. Various reports have noted a correlation between the time it takes to spot an intrusion and the cost of recovery.
The post Why Responding to a… Continue reading Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable

Bad Security Bug in GnuPG: C Language Blamed (Yet Again)

GnuPG has a serious vulnerability, in a library also used elsewhere: Libgcrypt 1.9.0 contains a classic programming error.
The post Bad Security Bug in GnuPG: C Language Blamed (Yet Again) appeared first on Security Boulevard.
Continue reading Bad Security Bug in GnuPG: C Language Blamed (Yet Again)

BlastDoor: iOS 14’s Shield Over Zero-Click Attacks

Bizarrely, it’s Google that revealed the big change that came in iOS 14 last year.
The post BlastDoor: iOS 14’s Shield Over Zero-Click Attacks appeared first on Security Boulevard.
Continue reading BlastDoor: iOS 14’s Shield Over Zero-Click Attacks

This is HUGE: Cops Nuke Emotet Crimeware C2

Police from eight countries have shut down all three of the Emotet malware’s “epoch” C2 server clusters. Incredible.
The post This is HUGE: Cops Nuke Emotet Crimeware C2 appeared first on Security Boulevard.
Continue reading This is HUGE: Cops Nuke Emotet Crimeware C2

Misconceptions of the SOAR “Playbook”

Most customers are surprised to learn that SOAR platforms rely on invoking 3rd party technologies, including next-generation firewalls and endpoint protection platforms via traditional API calls to isolate and quarantine malicious threats and users.
Th… Continue reading Misconceptions of the SOAR “Playbook”

Monitoring Microservices on AWS with Thundra: Part III

Welcome to the third and final part of our series on monitoring microservices on AWS with Thundra. In the first part of this series we talked about monitoring a microservice architecture based on serverless technology like AWS API Gateway and AWS … Continue reading Monitoring Microservices on AWS with Thundra: Part III

FBI to Investigate Parler, New Russian Host will be Revoked

A House committee has tasked the FBI to review Parler. Follow the money.
The post FBI to Investigate Parler, New Russian Host will be Revoked appeared first on Security Boulevard.
Continue reading FBI to Investigate Parler, New Russian Host will be Revoked