Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Successful Strategies for API Security Deployments (Wallarm October 2nd Webinar)

With the dramatic rise in API threats, API Security is a must-have security control for large and small organizations. Securing your APIs requires a clear understanding of your infrastructure and technology stack. In this webinar, we'll explore the requirements, best practices, and pitfalls of deploying an API Security platform, including: Join Wallarm experts with vast experience deploying API security across different types of infrastructure for the informative presentation.

Friday Flows Episode 40: Solving the SOAR Integration Problem with Tines

A common question we get is, 'Can Tines integrate with X?' This question stems from the status quo around integration in general. Many people believe that app-based integration is the only way, and as a result, tools remain siloed. Tines co-founders Eoin Hinchy and Thomas Kinsella sought to change that, eliminating wrappers, and building Tines with an API-first mindset. In this episode of Friday Flows, host Cameron Higgs dives into some of the common stumbling blocks with SOAR integrations, and walks through multiple ways to connect Tines to your internal and external tools.

Friday Flows Episode 37: How GitLab saved 1000s of Hours and Beat Alert Fatigue

This week on Friday Flows, host Cameron Higgs takes a deep dive into the top Tines workflows powering GitLab's incident response team. The time savings are undoubtedly impressive, but the long-term benefits are equally impactful: Standardizing processes to improve consistency Reducing alert noise, helping to reduce burnout likelihood Improving documentation to better support incident response.

Ensuring Classified Data Doesn't End Up Public Using Data-centric Zero Trust

This week, the FBI announced it is investigating a classified data leak of U.S. intel on Israel’s plans to retaliate against Iran. The top-secret documents were exposed on the Telegram messaging app, and it’s unclear if it was a leak or hack. The investigation will center on the Defense Department’s National Geospatial-Intelligence Agency, which manages the country’s network of spy satellites and anyone with access to the classified document.

Corporate Fraud: Detection, Prevention, and the Role of Corporate Fraud Attorneys

The growing scale of organizations and the more opportunities to push the boundaries have led to an upsurge in corporate fraud in recent years. Fraud can be a deceptive action taken against a company or one carried out by the company. A company could commit fraud in many ways to improve its industry reputation and defend itself from audits. On the other side, a company may become a victim of financial statement fraud, asset theft, and corruption committed by its staff members.

Understanding Human Risk in Cybersecurity

One of the most challenging elements of securing an organization from cyber threats is ensuring that their employees aren’t placing themselves or their colleagues at risk. But as Arctic Wolf’s new Human Risk Behavior Snapshot shows, even security practitioners and IT leaders aren’t always model citizens when it comes to mitigating their own cyber risk.

CVE-2024-47575: Critical Vulnerability in FortiNet FortiManager Under Active Exploitation

On October 23, 2024, Fortinet published an advisory disclosing an actively exploited vulnerability (CVE-2024-47575) affecting FortiManager and FortiManager Cloud. The critical-severity vulnerability can be exploited on FortiManager instances exposed to the internet via port 541. Successful exploitation could allow a remote, unauthenticated threat actor to execute arbitrary code or commands via specially crafted requests.