Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Simplifying Security Workflows with ThreatQuotient Automation

It’s not just about speeding up processes; it’s about efficiency, accuracy, and ultimately, staying one step ahead of threats. At ThreatQuotient, we’re committed to partnering with our customers to harness the power of automation in targeted ways that simplify and streamline workflows for security teams.

Afni's Brent Deterding on deploying MFA for 10,000 employees and becoming "the Happy CISO"

In this week’s episode of The Future of Security Operations podcast, I'm joined by Brent Deterding. Brent has over 25 years of experience in security, both on the vendor side and now as a security leader. He spent a big part of his career with cloud-native security analytics platform SecureWorks, and he’s currently the CISO of Afni, a global provider of contact center solutions in the U.S., Philippines, and Mexico.

Inside the war room: Best practices learned from the Sumo Logic security incident

In November 2023, Sumo Logic experienced a security incident. While no one wants to be a victim of a cyberattack, and we certainly learned a lot about things that we can do better in the future, our team was lauded by customers and media alike for how we handled the situation underscoring the importance of a good incident response plan. One of the core values at Sumo Logic is that we’re in it with our customers. But more broadly speaking, we’re in it with the InfoSec community.

External Penetration Testing: Cost, Tools, Steps, & Checklist

External penetration testing is a critical cybersecurity practice that helps organisations defend their internet-facing assets. By simulating the actions of a real-world attacker, external penetration tests reveal vulnerabilities in your web applications, networks, and other externally accessible systems.

Solving the Help Desk Dilemma with P-DEM

Leaders and agents running enterprise help desks today are in a very tough spot. They are tasked with resolving a dramatically increased volume of tickets, yet lack the visibility and tools needed to do so. Overwhelmed and often unable to do their jobs effectively, help desk professionals inevitably fall back on guidelines and rules of thumb that are simplistic and don’t reflect the complexity of a hybrid, digital workforce. Time is then wasted trying remedies that don’t produce results.

CrowdStrike Named Overall Leader in Industry's First ITDR Comparative Report

The industry’s first identity detection and response (ITDR) analyst report names CrowdStrike an Overall Leader and a “cyber industry force.” In KuppingerCole Leadership Compass, Identity Threat Detection and Response (ITDR) 2024: IAM Meets the SOC, CrowdStrike was named a Leader in every category — Product, Innovation, Market and Overall Ranking — and positioned the highest for Innovation among all eight vendors evaluated.

JFrog Security research discovers coordinated attacks on Docker Hub that planted millions of malicious repositories

As key parts of the software ecosystem, and as partners, JFrog and Docker are working together to strengthen the software ecosystem. Part of this effort by JFrog’s security research team involves continuous monitoring of open-source software registries in order to proactively identify and address potential malware and vulnerability threats.

The Top 11 Legal Industry Cyber Attacks

A law firm can only be successful if it can meet the needs of its clients, and few components put that success at risk more than the rising danger and repercussions of a cyber attack. In addition to the time, effort, and money a firm must spend responding to a successful breach, employees may find themselves unable to access the firm’s technology and, therefore, unable to bill hours.

The Importance of Identity Security in Zero Trust Endpoint Defense

Identity security and Zero Trust have emerged as critical components in the defense against quickly evolving cyberthreats. Together, the solution and the approach support a default stance of “never trust, always verify,” with every risky action requiring authentication, authorization and audit.