Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

5 Questions to Ask Before Implementing an XDR Program

Ladies and gentlemen of all ages and security roles, let us dive head-first into this newish thing called XDR. There is no shortage of vendors, and researchers, providing you their definition on what XDR actually represents so it becomes is there one you agree with or not. Taking a slightly different tact to explore what does XDR mean to you, and your security team.

April Developer Roll Up

The months continue to peel off of the calendar and Spring is in the air. As usual, the team at LimaCharlie has been busy pushing the state of cybersecurity forward. In the last month, we have fixed some bugs, brought real-time detections into the web application, and launched a new sensor type. On May 19th at 10.00 AM PST join us as we present a webinar on how to reduce security tooling spend by augmenting Splunk and other high-cost data solutions with LimaCharlie.

What's new in Elastic Security 8.2: Streamline analyst workflows with context and expertise

Elastic Security 8.2 powers the efficiency and effectiveness of security teams, arming analysts with invaluable insights and deep visibility into the attacks targeting their organization. The release delivers rich alert contextualization, osquery host inspection directly from an alert, new investigation guides, and the general availability of threat intelligence. Let’s jump in.

Digital Payment Monitoring: 5 Steps That Will Save Time, Boost Payment Security, and Increase Revenue

More and more, consumers globally are ditching cash and adopting digital payments. They expect a seamless customer experience and faster transactions. This can cause financial institutions and businesses to face new challenges in payment monitoring. According to a report from the U.S. Public Interest Research Group, in the last few years, consumer complaints about mobile payment apps and digital wallets have skyrocketed.

Top 5 Tips for a Secure Password

As the data of the world continues growing at an exponential rate year after year, cybercriminals have come up with highly complicated ways to get access to your personal information. They make use of simple password hacks to malware attacks and even phishing scams. It implies that if you wish to stay alert about all types of potential attacks, selecting a good, strong password is an important aspect to consider.

The state of cloud-native security 2022 - Tigera's new market report

We are excited to announce the publication of our first State of Cloud-Native Security market report! The report compiles survey results from more than 300 security and IT professionals worldwide (all of whom have direct container responsibilities), and explores organizations’ needs and challenges when it comes to containers and cloud-native applications, specifically in the areas of security, observability, and compliance.

Reciprocity Community Edition Best Practices: How to Get Started with the Reciprocity ROAR Platform

The Reciprocity® Community Edition is now available and is your chance to see the new Reciprocity ROAR Platform in action and it…is…totally…free! This is a great opportunity for you to not only get an instance of the ROAR Platform but also to see how the Reciprocity Community can provide you with meaningful content and connections to other organizations facing similar challenges. And did I mention that it’s free?!?

NeoSystems Strengthens Channel Program; Names Kathlyn Gibbs to Lead Effort as VP, Partners and Alliances

TYSONS CORNER, Va., May 3, 2022 – NeoSystems, a full-service strategic outsourcer, IT systems integrator and managed services provider to the government contracting market, is strengthening its channel program and has named Kathy Gibbs to lead this effort as Vice President, Partners and Alliances.

Sponsored Post

What Is CSPM? A Closer Look at Cloud Security Posture Management

As we previously discussed in the Automating Your Cloud Security Posture Management (CSPM) Response blog post, CSPM is a vital component in any environment leveraging cloud services. Whether you are using a single cloud or are in a multi-cloud scenario, the complexity of these cloud platforms is constantly expanding. Staying on top of new changes in policies and functionality to ensure that you are maintaining a secure environment is daunting - and almost impossible to do without automation. No one has the resources to spend on maintaining a large team of cloud specialists who just audit everything that is in use.