Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Tanium Podcast | Integrate Tanium and ServiceNow to save time, money, and your CMDB

“We want to be the eyes and the hands of the organization.” As the eyes and hands, Tanium can quickly spot and remediate vulnerabilities, while ServiceNow maintains your data regarding business service criticality. It’s a partnership. And your configuration management database (CMDB)? That’s your single source of truth. Host: Doug Thompson, chief education architect, Tanium Guest: Brandon Wolfe, senior director for strategic partnerships, Tanium.

Converge 2024 Labs - Microsoft Copilot for Security and ServiceNow SecOps - Tanium Tech Talks #108-2

The Power of Three: Explore What's Possible When Integrating Microsoft Security Solutions With Tanium and ServiceNow Dive into the world of cutting-edge security by integrating Microsoft Security Copilot with Tanium and ServiceNow. This hands-on lab will guide participants through detecting incidents, automating ticket creation, performing initial triage, and remediating security issues efficiently. By the end of this lab, participants will be equipped to enhance their organization’s security posture through streamlined workflows and powerful integrations.

Building Security In Maturity Model or BSIMM from Black Duck | Black Duck

Black Duck BSIMM Assessments helps organizations plan, implement, and measure their software security initiatives. A BSIMM assessment provides an objective, data-driven evaluation that leaders seeking to improve their security postures can use to base decisions about resources, time, budget, and priorities.

SEBI's CSCRF Regulation

India's Securities and Exchange Board (SEBI) has introduced a new regulatory framework called the Cyber Security and Cyber Resilience Framework (CSCRF). The regulation aims to tighten cybersecurity and data governance for capital market participants. As cyber threats increase globally, the CSCRF is poised to create a stronger defense line for organizations operating in India’s capital markets.

Vanta accelerates ANZ momentum with localised frameworks, regional support, and a new Australian data centre

Managing compliance across various frameworks and standards can be challenging and confusing. Organisations must earn and maintain compliance with local and international standards and industry-specific regulations, all while keeping up with ever-evolving security and privacy best practices. This is particularly true for startups and scaleups in the ANZ region looking to accelerate growth, expand into international markets, and sell to new and larger customers with higher expectations. ‍

Detecting Microsoft Entra ID Primary Refresh Token Abuse with Falcon Next-Gen SIEM

Microsoft Entra ID Primary Refresh Tokens (PRTs) are an attractive target for threat actors because they are long-lived, they are broadly scoped and they often don’t have additional multifactor authentication requirements after they are obtained. In this blog, we will discuss what PRTs are, how they are issued and how recently released research gives threat attackers a new way to obtain them. Finally, we will examine how organizations can detect these attacks using CrowdStrike Falcon Next-Gen SIEM.

When SASE Meets DEM: Revolutionizing the User Experience

In today’s fast-evolving business world, IT Teams must ensure seamless user experiences to stay competitive. As networks grow more complex, IT faces increasing challenges in identifying and resolving performance issues that impact user productivity and satisfaction. Cato Digital Experience Monitoring (DEM) addresses these challenges, helping IT ensure optimal user experiences.

Vital Signs of Software Dependencies: Understanding Package Health

As the vast majority of modern applications rely heavily on open-source software, dealing with updates for dependencies can become a major hassle for both developers and cybersecurity professionals. Every developer knows the pain of an update breaking their application. Manually determining which dependencies to run can become a massive time-suck, which is why many developers fall behind on updates, leaving applications open to vulnerabilities.