Data Loss Prevention: Artificial Intelligence vs. Human Insight

The cybersecurity landscape continues to evolve as cybercriminals become ever more sophisticated, and digital security tools accelerate to mitigate the risks as much as possible. 2020 presented even more opportunities for hackers to strike, for exam… Continue reading Data Loss Prevention: Artificial Intelligence vs. Human Insight

Trump Hates Cloud, Because China Cyber?

Hidden among the former president’s final executive orders was a juicy time-bomb under American cloud-computing companies.
The post Trump Hates Cloud, Because China Cyber? appeared first on Security Boulevard.
Continue reading Trump Hates Cloud, Because China Cyber?

Revealed: Sophisticated ‘Watering Hole’ Attack – But By Whom?

Google revealed a novel, complex, well-engineered campaign of targeted attacks. But there are more questions than answers.
The post Revealed: Sophisticated ‘Watering Hole’ Attack – But By Whom? appeared first on Security Boulevard.
Continue reading Revealed: Sophisticated ‘Watering Hole’ Attack – But By Whom?

Install Apache Zeppelin and connect it to AWS Athena for data exploration, visualization and collaboration

Introduction Apache Zeppelin is a Web-based, open source, notebook system that enables data-driven, interactive data analytics and collaborative documents with SQL. At Imperva Research Group we use it on a daily basis to query data from the Threat Rese… Continue reading Install Apache Zeppelin and connect it to AWS Athena for data exploration, visualization and collaboration

A Utility Company’s Barriers to Successful Network Oversight

The only truly workable network solution must bridge the inherent gaps that exist throughout [infrastructure] systems. It must also be capable enough to root out hidden vulnerabilities ripe for hacking.
The post A Utility Company’s Barriers to Successf… Continue reading A Utility Company’s Barriers to Successful Network Oversight

Hackers Didn’t Only Use SolarWinds to Break In, Says CISA

It wasn’t just the SolarWinds supply-chain hack. There were other ways that the “Russian” hackers broke into countless government agencies and private organizations.
The post Hackers Didn’t Only Use SolarWinds to Break In, Says CISA appeared first on … Continue reading Hackers Didn’t Only Use SolarWinds to Break In, Says CISA

A practical way to rule out false positives

Alert fatigue and staffing shortfalls have been two of the most-commonly cited issues facing security team managers and members for many years. An increasingly large ecosystem of products has made little dent in this situation. In fact, installing… Continue reading A practical way to rule out false positives

Our Top 10 Blog Posts Of 2020 – Insider Threats, Cybersecurity and More

2020 was not like most of us imagined it would have been. With Covid-19 came…
The post Our Top 10 Blog Posts Of 2020 – Insider Threats, Cybersecurity and More appeared first on Gurucul.
The post Our Top 10 Blog Posts Of 2020 – Insider Threats, Cybers… Continue reading Our Top 10 Blog Posts Of 2020 – Insider Threats, Cybersecurity and More

Monitoring Microservices on AWS with Thundra: Part II

This is part two of a three-part article series about monitoring microservices on AWS with Thundra. In the first part, we talked about monitoring a serverless architecture based on API Gateway, Lambda, S3, and SES.
The post Monitoring Microservice… Continue reading Monitoring Microservices on AWS with Thundra: Part II

Our Top 2020 Cybersecurity Insights

The transition from office to remote environments was abrupt and one of the most defining moments that the cybersecurity industry and professionals faced in 2020. We wrote about the top issues CISOs were facing throughout the year but also doubled down… Continue reading Our Top 2020 Cybersecurity Insights