Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

The Value of Continuous Threat Exposure Management in Securing the Evolving Attack Surface

In cybersecurity, current approaches don’t stay current for long. Organizations that fail to adapt accordingly often discover this fact at the cost of their secure network. This is particularly true in the face of complex and increasingly unpatchable attack surfaces and a corresponding reduction in the impact of automated remediation practices. Traditional security approaches are unable to fully address these challenges.

What is a SOC in cyber security? Definition & Meaning

You may have heard people talking about SOC recently, especially now with the increase in the use of digital assets and remote applications. In these cases, SOC enables organisations to bolster their security posture and be more proactive in detecting and preventing threats. But what is SOC in cyber security?

Snowflake Breach: Examination of 'whitewarlock' claims

According to the latest news, the cloud-based data storage and analytics giant Snowflake has supposedly suffered a breach according to researchers that interacted with a certain Threat Actor known as ‘whitewarlock’ on the deep web hacking forum ‘exploitin’. Cyberint found the original compromised machine potentially exploited by ‘whitewarlock’. Over 500 demo environment instances were found included in the malware log.

Combining External Attack Surface Management and Crowdsourced Security Testing - Webinar Recap

Bugcrowd offers crowdsourced security testing through a community of white hat hackers. CyCognito offers automated discovery of an organization’s externally exposed attack surface. Combined, the two solutions allow for a comprehensive inventory of exposed assets to be included in the scope of bug bounties or pentests.

Executive Chair David Safaii's Report from Mobile World Congress 2024

The streets of Barcelona buzzed with anticipation as the Mobile World Congress 2024 (MWC) unfolded, unveiling insights and innovations that paint a vivid picture of our technological tomorrow. With almost 100,000 people in attendance, MWC is clearly on the world’s stage as dignitaries like the King of Spain and tech leaders like Michael Dell, Antonio Neri, Ziad Asghar and others spoke at the podium and on panels.

Random but Memorable - Episode 12.3: New Fingerprint Clone Magic ft. Mac Admins Podcast

What's the number one thing anybody can do to protect their own security? On today’s episode, Charles, Marcus, and Tom from the Mac Admins Podcast share their top tips for Apple device users looking to manage their own security. 🖥️📱 In Watchtower Weekly, we dissect the recent 'on-again-off-again' takedown of infamous ransomware gang, Lockbit. Plus, Sara seeks revenge as she hosts Security Blank for the very first time! 🔒💢

Side Channel Attack: Everything You Need To Know

Every year, millions of people get victimized by data breaches. Criminals steal their data from the network environments of organizations, vendors, providers, institutions, and governments; with ever-increasing frequency, cybercriminals are making big moves in the cyber wars—and making billions of dollars.

Elastic's Mandy Andress on switching from a tech-first to people-first approach to security

To kick off season 5 of the Future of Security Operations podcast, Thomas is joined by Mandy Andress. Mandy is the Chief Information Security Officer at Elastic, a leading platform for search-powered solutions, and has more than 25 years of experience in information risk management and security. Before Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She also founded an information security consulting company with clients ranging from startups to Fortune 100 companies.

Friday Flows Episode 22: Run a Simulated Phishing Attack on your employees

A fundamental pillar of cybersecurity continues to be employee education & awareness. Today's Friday Flows features an easy way to test your employees & teach them to keep an eye out for suspicious emails. 👀 This Tines story created by Conor Dunne grabs a list of employees from your HR system and sends them a simulated phishing email. A Tines Case will be created to track if a link in the email is clicked.