Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Organizations Need to Adapt to a Changing Cybersecurity Landscape

The future is already here. Is it everything we expected? That depends on who you ask, but the nightmare of maintaining cybersecurity has certainly persisted just as many sci-fi stories predicted. As we move further into the digital era, the stakes in cybersecurity only get higher and higher. So what are some of the main things that organizations should consider in building a solid cybersecurity strategy? Here are a few tips below.

5 Steps to Proving your Business Needs Bot Management

In a recent Technical Showcase webinar, Netacea Senior Data Analyst Paulina Cakalli described how businesses can quickly prove the value of bot management during a proof-of-concept (POC) or proof-of-value (POV) engagement. Evidencing the effectiveness of bot management is important because IT solutions, particularly security solutions, are often costly, require board buy-in, and can be difficult to measure in terms of success. Watch the webinar on-demand now.

Top Security Risks of Cloud Computing & How to Avoid Them

The need for versatile and affordable solutions for storing and processing data in enterprises makes cloud computing an increasingly attractive IT strategy. Cloud computing provides flexible and easy-to-use solutions. It can also be more cost-effective than traditional storage methods that require a physical server and hardware at your corporate premises, which is one of the reasons why businesses often make the switch.

How to Automate Vendor Risk Management

Managing third-party risk is a bit like throwing a fancy party. Everyone wants to attend, but you have to assure that only the most essential and top-rated VIPs get past the velvet rope. So you check attendees’ credentials at the door. Every company uses a third-party vendor or contractor at some point. Whether you are purchasing raw materials or outsourcing specialized processes, working with third parties can help you achieve a competitive advantage and cost savings.

Protecting Data at Rest vs. Data in Motion

Data theft can devastate any company, resulting in lost profits, regulatory enforcement, litigation, and reputational damage that can be difficult to overcome. Every organization must protect its customer data and assure that sensitive information is kept safe. That said, the data in your company’s possession is held in different states – and each of these states has particular vulnerabilities. A security tactic that works for one state may be inefficient for another.

How to Recover from a Client-side Attack

I recently spoke to a Chief Information Security Officer (CISO) who explained that he disliked marketing and saw it as a risk and cost center to his business. He seemed to believe that everything his company’s marketing team did on its website was a risk and even called some standard marketing practices “reckless.” I get it. To those who are unfamiliar with marketing, a lot of what marketers do can seem strange and intimidating.

DFIR Expert Interview: Mike Behrmann

My name is Mike Behrmann. I am the Director of Digital Forensics and Incident Response at Antigen Security. We are a DFIR-led consulting firm that specializes in incident response, recovery engineering, managed detection & response (MDR) and training. My job there is to oversee the DFIR practice itself: the people, the processes, the tooling, the cases and the customers. I'm an incident commander one minute, diving in like an analyst the next and even doing some business development.

Sponsored Post

Mitigating the Next Log4shell: Automating Your Vulnerability Management Program

As CVE-2021-44228, a.k.a "Log4Shell" or Apache Log4j Remote Code Execution vulnerability continues to send shockwaves across the world of software, many security vendors and practitioners are rushing to provide recommendations on dealing with the crisis. If you need immediate help mitigating the impact of Log4shell, we're here for that. But the goal of this post is to look forward. This isn't the first and won't be the last high-impact vulnerability to be uncovered. So it's worth preparing your organization for the next one, so that you can respond faster, mitigate and remediate sooner - and have fewer weekends like the last one.

How to Measure Risk Management Performance: KPI & Metrics

Cybersecurity professionals are facing an unprecedented amount of scrutiny. Not only are they responsible for securing and protecting their organizations, but they also need to prove that their ideas and strategies for doing so have a meaningful impact. This can be hard when the threat landscape is constantly changing and new tactics to fight cyberattacks shift regularly.