Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Observations and Hot Topics from Black Hat USA 2022 and DEF CON 30

Now that Black Hat USA 2022 and DEF CON 30 are over, it is time to reflect on the security industry nicknamed “Summer Camp”, and the week that was in Las Vegas. We had a number of Netskopers from across different teams on the ground and in-person attending the conferences. Like with any large conferences, there were likely many folks who weren’t able to make it out to Las Vegas this year for myriad reasons.

Kerberos Explained

In Greek mythology, Kerberos is a multi-headed dog that guards the gates of the underworld. The Kerberos meaning in technology is analogous: Kerberos is an authentication protocol guards the network by enabling systems and users to prove their identity to one another before access to resources is granted. Read on to learn how Kerberos authentication works and get valuable tips for avoiding issues.

Crypto and phishing - how criminals are cashing in

Over the past several years, crypto has become increasingly mainstream. Research has predicted that by the end of 2022, the number of US adults who own at least one cryptocurrency will increase by 19% to 33.7 million. This equates to 12.8% of the population. Naturally, cybercriminals have quickly learned how to cash in on this popularity.

Protecting the Modern Healthcare Industry Requires Human Expertise and Innovative Partnerships

Protecting healthcare-related data requires a special level of technological and human support where the two support and interact with each other in harmony. Trustwave delivers this protection through its integration with Microsoft Azure Sentinel Security Information and Event Management (SIEM) solution allowing healthcare organizations to focus on caring for their patients while we protect their environment.

The One-Stop Kubernetes Security Checklist

Securing your Kubernetes environments may seem daunting at first, given how many different parts must be individually protected. Still, with the proper organization, you can make Kubernetes security much simpler and more effective. We’ve put together a complete Kubernetes security checklist of best practices and security recommendations to help you keep track of your progress. To make this a little easier, we’ve divided this checklist into the following sections.

A 7-Step Process for Strategic Risk Management

Modern-day enterprise risk management (ERM) is a disciplined, organization-wide approach to identifying and addressing a wide range of enterprise risks, such as operational risk, financial risk, compliance risk, and strategic risk. Organizations with robust ERM programs can better manage and mitigate risk and minimize the potential for losses or damage. ERM incorporates different strategies, tactics, and plans for each type of risk because those risks affect the organization in different ways.

AuthPoint MFA Recognized for Optimal Performance and Competitive Price Offer

WatchGuard and Miercom, an independent organization focused on product testing, have worked together on testing three MFA solutions to assess performance and cost effectiveness, as well as user and admin experience. AuthPoint MFA was tested competitively with two similar solutions: Cisco Duo and Azure MFA.

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that each organization has in its environment. Similarly, when it comes to cybersecurity, it’s become essential to evaluate and quantify the security posture of every organization.