Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Splunk SOAR Playbook of the Month: Splunk Attack Analyzer Dynamic Analysis

Alert triage can be a very cumbersome and time consuming process for SOC teams. Our recent State of Security report found that 26% of respondents agree that the volume of alerts they deal with makes it difficult to keep up with addressing emergencies. While tools like virtual sandboxes can help analysts better test and understand the severity of the threats they encounter, the process of testing and documenting results can add further tedium to an already prolonged process.

2024 RSA Recap: Centering on Cyber Resilience

Cyber resilience is becoming increasingly complex to achieve with the changing nature of computing. Appropriate for this year’s conference theme, organizations are exploring “the art of the possible”, ushering in an era of dynamic computing as they explore new technologies. Simultaneously, as innovation expands and computing becomes more dynamic, more threats become possible – thus, the approach to securing business environments must also evolve.

AWS WAF vs. AppTrana WAF

AWS WAF, a widely used security tool from Amazon Web Services, is a web application firewall designed to safeguard web application servers against various online threats. The tight integration of AWS WAF with key AWS services, including Amazon CloudFront CDN, Application Load Balancer (ALB), and Amazon API Gateway, ensures a comprehensive security approach. AWS WAF can also protect services offered by other providers as long as the content is delivered via the CloudFront distribution network.

BreachForums seized! One of the world's largest hacking forums is taken down by the FBI... again

Law enforcement agencies worldwide have coordinated to take down one of the world’s largest hacker forums, scoring a victory against cybercrime. BreachForums, a notorious marketplace for stolen data, was seized by the authorities on Wednesday, according to a message on its website.

Applying Zero Trust to Security Service Edge (SSE)

The current situation with legacy on-premises security defenses trying to support a hybrid work environment and zero trust principles is challenging for companies. Complications can include poor user experience, complexity of disjointed solutions, high cost of operations, and increased security risks with potential data exposure. Simple allow and deny controls lack an understanding of transactional risk to adapt policy controls and provide real-time coaching to users.

Spring into Action: A Corporate Digital Spring Cleaning Plan

Spring cleaning is no longer just about spotless windows and gleaming floors. In the digital age, businesses need to consider the clutter accumulating in their virtual filing cabinets too. A corporate digital spring cleaning can breathe new life into your organization’s online presence and data management practices.

From Doodles to Masterpieces: How AI Art Generators Transform Sketches into Art

Artificial Intelligence (AI) has permeated nearly every aspect of our lives, from powering virtual assistants to driving autonomous vehicles. However, one of the most intriguing applications of AI is in the realm of art generation. With the emergence of free AI art generators and background removers, individuals now have the power to transform simple doodles into stunning masterpieces with just a few clicks. In this article, we delve into the world of AI-generated art, exploring its capabilities, implications, and the creative freedom it offers to artists and enthusiasts alike.

ManageEngine Endpoint Central takes home 5 Global InfoSec Awards 2024

What an exciting way to start the month! We’re thrilled to announce that ManageEngine has received 12 Global InfoSec Awards from Cyber Defense Magazine. Among these accolades, five recognize our innovative Unified Endpoint Management and Security solution, Endpoint Central.

Fall of Major Ransomware Groups Sparks Rapid Rise of New Threats

In 2023, international law enforcement agencies intensified their efforts against ransomware, resulting in the decline of groups such as Hive, Ragnar Locker, and the collapse of ALPHV (BlackCat). These actions underscore the growing challenges faced by ransomware groups. The significant operation in February 2024 targeting LockBit, which included arrests and the seizure of data leak sites and servers, represents one of the largest law enforcement actions taken against a major ransomware operation.

How Should Sensitive Information Be Stored?

When we think about storing sensitive information, two types of information come to mind: digital data and physical data. While physical data can be securely stored in a physical vault, digital data should be stored in an encrypted cloud storage solution to protect it from common cyber threats. Continue reading to learn the best ways to store your sensitive physical and digital information, plus the storage methods to avoid.