Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

RiskIQ vs. SecurityScorecard Comparison

Every week the news is full of new exposures of protected health information (PHI) and personally identifiable information (PII). These security incidents are not only more common but also more costly. The average cost of a data breach is now nearly $4 million globally and third-party vendors, cyber attacks, and misconfiguration are three of the main culprits.

The MITRE ATT&CK Framework: Credential Access

There’s no doubt about it, attackers want your credentials more than anything, especially administrative credentials. Why burn a zero-day or risk noisy exploits when you can just log in instead? If you were to break into a house, would you rather throw a brick through a window or use a key to the front door? What is the MITRE ATT&CK™ Framework? - YouTube An error occurred. Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.

Interplay of AIOps with ITSM Systems

ITSM systems and processes are similar to a front line defence system for Enterprises’ effort, in delivering superior customer satisfaction to its IT users. Enterprises are always looking for ways to resolve tickets as fast as possible and at an optimal cost. AIOps systems play a key role in automating data collection required for analysis , equipping support teams with insights to take immediate remediation action and eventually leading to automation of the complete process.

Introducing remediations, Python support and more...

Note: This is Bearer's monthly newsletter. Subscribe below to get it in your inbox. I hope you are doing well with this never-seen-before-worldwide-lockdown. The whole Bearer team is locked down as well, but still improving your beloved product! We have a lot of updates and awesome new features for you to explore today. Here is a short overview to get you started!

Why You Need a Just-in-Time Approach to Privileged Access Management

Privileged access is granted to certain users so they can perform their work. Yet admin and service accounts often are the causes of cybersecurity incidents since they allow their owners to install and remove software, modify system configurations, and more. Even with privileged access management practices in place, malicious actors can continue to find new ways to compromise your sensitive data. However, a new just-in-time PAM approach promises to improve the situation.

The Role of SOC Outsourcing in a Secure Enterprise

During the past decade, security operations centers (SOC) have become an integral part of the cybersecurity programs of many organizations. When you think of a defined team spending all of its time managing security events and using consistent processes for remediation, you may envision a group of company employees who report to a CIO or CISO.

How to Do Cyber Forensic Investigation with SOAR?

The incident response process is incomplete unless the cyber forensic investigation takes place. In fact, forensic investigation helps in identifying the causes of the attack and the main culprits behind the attack. Usually, the Computer Security Incident Response Team (CSIRT) has to gather forensic details such as logs or artifacts in the aftermath of the incident.

What Compliance Lessons Can We Learn From Past Pandemics?

COVID-19 has us reeling from health, social, and economic shocks, but this isn’t our first global crisis. It is, however, the first in which cybercrime plays a starring role. The world has faced several pandemics in the past 100 years—several influenza pandemics including swine flu (H1N1) and Avian, or bird, flu, and HIV/AIDS—as well as economic depression and a number of recessions.

Working from home? Use the spare time for professional development

It’s 2020 and our world is rapidly evolving. Many conferences and training programs have been cancelled, most of us are working from home, and it may seem like learning opportunities are scarce. If you are locked in your house due to COVID-19, what could you be doing to improve your cybersecurity & information security skills? Let me share a few ideas.

RiskIQ vs. BitSight Comparison

Cyber attacks, misconfiguration, data leaks, and data breaches are increasingly common. Each week the news is full of new exposures of protected health information (PHI) and personally identifiable information (PII). These security incidents are not only more common but also more costly. The average cost of a data breach is now nearly $4 million globally. For breaches involving third-parties, the cost increases to $4.29 million according to a recent report by IBM and the Ponemon Institute.