How purple team operations helped defend the Pentagon — and can help your security team today.

The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
The post How purple team operations helped defend the Pentagon — and can help your security team today. appea… Continue reading How purple team operations helped defend the Pentagon — and can help your security team today.

Source Defense is One of the First to Offer Critical Security Technology in the SecurityScorecard Integrate360° Marketplace

SecurityScorecard, a key Source Defense partner and the global leader in cybersecurity ratings, recently launched its Integrate360° Marketplace, the industry’s first ecosystem for cyber risk ratings. For the first time, security professionals have a on… Continue reading Source Defense is One of the First to Offer Critical Security Technology in the SecurityScorecard Integrate360° Marketplace

New Report: Ransomware, Vulnerabilities and IoT Security Threats

Nozomi Networks Labs has produced a new OT/IoT security report. Don’t miss this summary of vulnerability trends as well as important information about ransomware and IoT security camera threats.
The post New Report: Ransomware, Vulnerabilities and IoT… Continue reading New Report: Ransomware, Vulnerabilities and IoT Security Threats

Webinar Recap: Tool Sprawl – The Trillion Dollar Problem in Cybersecurity

The panelists shared that for CISOs sitting in the cyber leadership position, when new systems, platforms, and services are being procured, are they being procured while looking at the whole picture? Or is it a one-off purchase for a single problem or … Continue reading Webinar Recap: Tool Sprawl – The Trillion Dollar Problem in Cybersecurity

Mitigating sophisticated attacks — the NuData way (part II)

It’s getting harder to tell humans and robots apart. Mitigating sophisticated attacks is possible, but requires behavioral defenses. Read on.
The post Mitigating sophisticated attacks — the NuData way (part II) appeared first on NuData Security.
The po… Continue reading Mitigating sophisticated attacks — the NuData way (part II)

The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided

On July 2, 2021, the REvil ransomware group successfully exploited a zero-day vulnerability in the on-premise Kaseya VSA server, enabling a wide-scale supply chain cyber attack. Let’s dig in and see how the attack happened, how attack emulation could h… Continue reading The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided