Review: Group-IB Threat Intelligence & Attribution (TI&A)

Organizations and enterprises that care about business continuity should have an established security program that needs to be reviewed on a regular basis. One of the hardest parts of creating a security strategy is deciding how to allocate resources &… Continue reading Review: Group-IB Threat Intelligence & Attribution (TI&A)

eBook: Anomaly Detection in Cybersecurity for Dummies

One of the best ways to defend against both internal and external attacks is to integrate anomaly detection, a.k.a. user and entity behavior analytics capabilities, into your security analytics solution. This eBook breaks down the different types of se… Continue reading eBook: Anomaly Detection in Cybersecurity for Dummies

Product showcase: CIOs can optimize and secure hybrid IT environments with Runecast

As cybersecurity and regulatory compliance become the two largest concerns of corporate boards (Gartner, 2021), many organizations are adding cybersecurity experts specifically to scrutinize security and risk issues. Modern hybrid data center architect… Continue reading Product showcase: CIOs can optimize and secure hybrid IT environments with Runecast

Product showcase: CIOs can optimize and secure hybrid IT environments with Runecast

As cybersecurity and regulatory compliance become the two largest concerns of corporate boards (Gartner, 2021), many organizations are adding cybersecurity experts specifically to scrutinize security and risk issues. Modern hybrid data center architect… Continue reading Product showcase: CIOs can optimize and secure hybrid IT environments with Runecast

Strong security starts with the strengthening of the weakest link: passwords

Darren Siegel is a cyber security expert at Specops Software. He works as a lead IT engineer, helping organizations solve complex challenges within IT security. In this interview with Help Net Security he discusses the challenges related to password se… Continue reading Strong security starts with the strengthening of the weakest link: passwords

Product showcase: Adaptive Shield SaaS Security Posture Management

Whether it’s Office 365, Salesforce, Slack, GitHub or Zoom, all SaaS apps include a host of security features designed to protect the business and its data. The job of ensuring that these apps’ security settings are properly configured falls on the sec… Continue reading Product showcase: Adaptive Shield SaaS Security Posture Management

The CISO’s guide to evaluating third-party security platforms

A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you remediate risk if your vendors fall short. And the right third-party security managem… Continue reading The CISO’s guide to evaluating third-party security platforms

Analyst guide: Encryption solutions buyers checklist

Encryption plays a key part in email security, ensure you find the right fit for your enterprise. Finding ways to secure information effectively is a must. This challenge is perhaps never more pronounced than it is with email. Whether you have somethin… Continue reading Analyst guide: Encryption solutions buyers checklist

Why the updated OWASP Top 10 list can’t be addressed by WAF?

Did you know that OWASP published its updated Top 10 web vulnerabilities list? And that it includes updates that could impact the design and functionality of your WAF solution? Note that the preliminary API risk factors published by OWASP are not align… Continue reading Why the updated OWASP Top 10 list can’t be addressed by WAF?

The impact of the Log4j vulnerability on OT networks

Operational Technology (OT) networks are at risk from the recently-announced Apache Log4j (CVE-2021-44228) vulnerability. On the surface, it is not clear why this should be. The vulnerability affects millions of web servers, allowing remote attackers t… Continue reading The impact of the Log4j vulnerability on OT networks