Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Drive down the risks of security threats with secure ELDs

During this National Truck Driver Appreciation Week, we review how to ensure security on the road with ELD cyber security considerations. According to the U.S. census in 2019, more than 3.5 million people worked as truck drivers, driving large tractor-trailers or delivery trucks. Given that over 70% of all freight is transported using trucks, trucking is a key part of the country’s critical infrastructure. Sadly, this has not gone unnoticed by cybercriminals.

Uncovering the powers of Cloud SOAR's Open Integration Framework

The speed at which security operations are processed and data is consumed is moving at a dazzling pace. This is why flexibility, customizability, and user-friendliness are deemed as core pillars of next-gen security solutions. And it is exactly what Cloud SOAR’s Open Integration Framework is all about.

My "Cybercrime" Isn't Your "Cybercrime"

Talk to cybersecurity experts about cybercrime on their network, and they will mention malicious activity like scans, attacks, events, and incidents. Probably at some point, they will slip into geek-speak with a vast array of confusing acronyms and jargon while explaining tactics and techniques by referencing infamous attacks, Internal protocols, and industry shorthand.

Integrating MITRE ATT&CK with Cloud SOAR to optimize SecOps and Incident Response

Today’s complex cyber threats leave no room for mediocrity. Security analysts must know who is attacking them, how the attacker gained access, what methods they used to infiltrate your systems, and what their next move might be. However, modern cyber threats leave no recognizable patterns in their behavior, making threat anticipation harder than ever. To boost their threat hunting capabilities, SOC teams must implement advanced technologies and strategic techniques.

How to improve MTTD and MTTR with SOAR

In today’s fast-paced cyber threat landscape, it is not a question of IF but WHEN an organization is going to get breached. And in order to prepare in a preemptive manner, organizations should strive to minimize their attackers’ dwell time as much as possible. This is why metrics such as MTTR (Mean time to respond) and MTTD (Mean time to detect) have grown to be highly relevant in the cybersecurity industry.

Hive Ransomware: Actively Targeting Hospitals

Most ransomware groups operating in the RaaS (Ransomware-as-a-Service) model have an internal code of ethics that includes avoiding breaching some specific sectors, such as hospitals or critical infrastructure, thus avoiding great harm to society and consequently drawing less attention from law enforcement.

Security Incident Containment with Teleport Session and Identity Locking

What would you do when a security incident is detected? Shut down the servers? Pull out the power cord from the data center? When an incident is detected, both the incident method and the time required to contain an incident are essential to limit the damage. The slower you are to react, the more damage an incident would incur. And a service downtime to contain an incident can cost businesses even more than a security incident itself.

What is the Digital Operational Resilience Act (DORA)?

The Digital Operations Resilience Act (DORA) is the European Union’s attempt to streamline the third-party risk management process across financial institutions. A draft of DORA was published by the European Commission on 24 September 2020. Without this act, there isn't an objective Information and Communication Technology (ICT) risk management standard in Europe.