Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Enhance threat response with Tines' Automation Capability Matrix

Tines' Automation Capability Matrix is a set of techniques designed to help security operations teams understand their automation capabilities and respond more efficiently to security incidents. With this new matrix, teams can identify automation opportunities and implement strategies to enhance their threat response efforts. This blog offers key insights into the Automation Capability Matrix, giving you a comprehensive understanding of its purpose and benefits.

How to Increase App Downloads? - 5 Best Important Tips

Need to boost the number of downloads for your application? Check out this detailed article on how to increase app downloads today! Uncover techniques such as user acquisition, optimization and more. Developed your application? Congratulations on that! The next challenge is how to increase your app download. After all, the bottom line is to get it downloaded by users and ultimately used.

Understanding Evolving Insider Risks in a Hybrid World

Insider risks are threats that already have access to an organization’s sensitive information. They are people who have physical access to the organization’s buildings and credentials to sign-on to the network. But maybe more importantly, they’re familiar with the organization’s processes, they speak the company lingo, and they know where the important assets reside.

Elastic Security 8.6 improves investigation and response across a unified SIEM, endpoint security, and cloud security solution

Elastic Security 8.6 helps security practitioners investigate and respond to threats quickly at cloud scale with SIEM, cloud security, and endpoint security. This release includes new data source integrations, expanded prebuilt detection content, and improved detection engineering and analyst workflows — bringing efficacy and efficiency to the modern security operations center (SOC).

Snyk's AppSec journey in 2022

Coming off a rough and wild end to 2021 with Log4Shell in all our minds, Snyk jumped out of the gates quickly and began providing the AppSec world with new capabilities that did not disappoint. In this blog, you can review most of the key investments we made in 2022 to improve performance, add new ecosystems, and support the enterprise.

Myth Busting: Why Moving From VPN to ZTNA Doesn't Have to be a Heavy Lift

Over the last few years many organizations have already introduced a zero trust network access (ZTNA) solution, and are seeing the benefits from it. But many others have been put off by the work needed to transition to a zero trust-based access model and the associated technical integration work.

Predictions 2023: Data Investments Will Pay Off for the Public Sector

Here at Splunk we’ve been looking ahead to 2023 through our annual predictions for the public sector. This report is once again published alongside our leadership insights and emerging trends, IT and observability, and security editions. The new year presents many challenges that will affect the public and private sectors alike, including economic volatility, intensifying cyberattacks, the tech talent shortage and more.

SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security

In December, CrowdStrike reported that beginning in June 2022, the CrowdStrike Services, CrowdStrike® Falcon OverWatch™ and CrowdStrike Intelligence teams observed an increase in the targeting of telco and BPO industries. CrowdStrike Intelligence attributed this campaign with low confidence to the SCATTERED SPIDER eCrime adversary.

Centralized Log Management: Why It's Essential for System Security in a Hybrid Workforce

Remote work increased due to Covid-19. Now heading into 2023, remote or hybrid workplaces are here to stay. Surveys show 62% of US workers report working from home at least occasionally, and 16% of companies worldwide are entirely remote. With a hybrid workforce, security breaches from sources were less typical with in-office work.