Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Threat Hunting in macOS with the SecOps Cloud Platform

The second most popular OS in today’s business environment, macOS, is often neglected in cybersecurity discussions. This is likely due to Windows OS holding a dominant share (72.1%) of the global workstation market and Linux (4.03%) running critical parts of IT infrastructure. This often leaves macOS excluded from the conversation.

As Security Budgets Cool, CISO's Warm Up to New Ideas

Security spending is losing momentum with a third of CISOs reporting flat or reduced budgets this year. These numbers come from a recent annual survey of 755 cybersecurity decision-makers conducted by IANS Research. Decreased spending in the face of growing cyberattacks put pressure on security leaders to find better ways to optimize their processes. Fortunately, CISOs are discovering solutions for this problem by following the tried-and-true tactics of simplification, consolidation, and innovation.

Platformization in cybersecurity: Dueling visions for the future of security

The platform approach in cybersecurity is gaining traction. However, it’s becoming clear that two very different models of platformization are in play. In this piece, we’ll talk about platformization in cybersecurity, the two major approaches to security platforms, and what it all means for the future of cybersecurity.

Automating Incident Response Workflows with LimaCharlie

As a security professional, you know that the ability to swiftly and effectively respond to threats is crucial. In this post, we’ll explore how LimaCharlie, a SecOps Cloud Platform, can help automate comprehensive Incident Response (IR) workflows, including forensic triage acquisition, evidence processing, and forensic timeline generation.

Defender Fridays Wrap-Up: Cybersecurity in Space, Enterprise Security Monitoring, and more

This session of Defender Fridays highlighted the importance of enterprise security monitoring. As cyber threats become more complex, the ability to detect and respond to them is crucial for modern business operations. Wes discussed various tools that help collect and analyze data from both networks and user endpoints, clarifying the limitations of TLS interception and concluded by recommending a blend of network and endpoint visibility for a comprehensive and robust security strategy. Links.

LimaCharlie Slashes Incident Response Times With New Bi-directional Capabilities

LimaCharlie introduces a new bi-directional integration platform enhancement, which allows for two-way data flows that streamline detection and response processes while eliminating reliance on third-party automation applications.

The evolution of threat intelligence platforms with Greg Martin

In a 'Defender Fridays' live session, Greg Martin, CEO of Ghost Security, revisited the early days of Anomali (formerly ThreatStream), emphasizing its pivotal role in threat intelligence platform (TIP) evolution. He shared the importance of meticulously managing and validating Indicators of Compromise (IoCs) to maintain their relevance and impact, advocating for a blend of automation and manual oversight to keep threat intelligence agile and effective.

Developing Enterprise DFIR Skills with Markus Schober

In a recent ‘Defender Fridays’ session, we spoke with Marcus Schober of Blue Cape Security, a leading expert in Digital Forensic and Incident Response (DFIR) to explore the advancing frontiers of enterprise security. The webinar underscored the indispensable role of continuous learning, practical training, and cross-disciplinary collaboration in mastering the complexities of today’s cybersecurity challenges.