Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler

Hybrid working models have increasingly become the normal way of doing business. Employees are working from anywhere, users and their devices are moving on and off the office network, and many applications once hosted in data centers are now moving to public clouds or being replaced with software as a service (SaaS).

Accelerated Cloud Adoption, Digital Transformation, and More Cyber Resiliency In 2023

In this episode of 2023 Predictions, Sathya Sankaran, General Manager of CloudCasa by Catalogic, speaks with Swapnil Bhartiya on his insights into where he sees the industry heading in 2023. The pandemic resulted in the acceleration of cloud adoption and digital transformation and Sathya expects this momentum to continue in 2023 as well.

Putting the 'E' in Team: Solution Integration Enablement for Security Build Motion Partners

I am sure many of you have heard the term “cybersecurity is a team sport.” If you haven’t, I say get on the right team. Security is a complex, ever-changing game of skill and preparedness (never chance). As we like to say here at Splunk, it is all about cyber resilience. To best be prepared to win this game, we need the best team. As with any team sport, there really needs to be other teams - after all what fun is it playing by yourself?

Redline Infostealer Analysis (Part 1)

This blog post will provide an analysis of the malicious Redline Infostealer payloads which have been taken from a real life malware incident, responded to and triaged by the ThreatSpike SOC team. This analysis will be broken down to demonstrate, describe and explain the various stages of the attack chain.

Distributed and remote operations: key concepts for unified security

The concept of the network perimeter has expanded dramatically in recent years. Many modern organizations operate in a distributed model, with branch locations and endpoints deployed outside of a physical office. But anything connecting to the corporate network is a potential vector for attackers, who can make their way into the network core (and potentially gain access to an organization’s “crown jewels”) by first compromising a branch office or an endpoint.

SIEM Tools: Which Vendors Should Be on Your List?

Whether your organization is ready to deploy its first security information and event management (SIEM) solution or you’re looking to upgrade to a modern, next-gen SIEM, the number and types of tools available in the market can be overwhelming. This post will help you choose the right vendor and best SIEM tools for your business needs. SIEM tools have been available for about 15 years, but like most technologies, there has been a great deal of evolution and innovation over that time.