Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What's TTP? Tactics, Techniques & Procedures Explained

The term Tactics, Techniques and Procedures (TTP) describes the behavior of a threat actor and a structured framework for executing a cyberattack. The actors can range from hacktivists and hobbyist hackers to autonomous cybercriminals, underground rings and state-sponsored adversaries. By understanding the Tactics, Techniques and Procedures involved in a cyberattack kill chain, businesses can discover, evaluate and respond to security threats with a proactive approach. Let’s take a look.

What Is the Safest Way To Send Sensitive Documents?

Sending sensitive information over the internet is often necessary, despite the risks. You may need to send copies of your passport to validate your employment status at a new job, or you might need to send tax forms with your social security number to your accountant. How can you send this information without making it vulnerable to cybercriminals? Using a software platform that uses zero-knowledge encryption is the most secure way to share sensitive information and files.

Attack Vector vs Attack Surface vs Attack Path (Interaction & Differences)

Cybersecurity is an intricate, multidimensional game of defense that requires businesses to stay one step ahead of threat actors. Among the several dimensions to consider, understanding the differences between attack vectors, attack surfaces, and attack paths is paramount. In this blog post, we aim to elucidate the concepts of attack vector, attack surface, and attack path, and how information security professionals can help secure their digital terrain more effectively.

Random but Memorable - Episode 10.9: Artificial Intelligence Mega Mixtape

In this episode we're bringing you a very special AI Edition of Watchtower Weekly. Tune in as we explain why all the headlines about AI cracking passwords are actually old news. And how AI is making pop fans’ fantasies come true. 🤖🔤🎶 We're also joined by Anna Pobletts for This Week at 1Password, where we unveil “Passage by 1Password” and two exciting new products: Passkey Complete and Passkey Flex. Settle in to find out what these solutions mean for passkeys and the passwordless future.

4 Signs of Incomplete Information Security Risk Management

In the realm of information security, risk management is often regarded as a vital component in safeguarding organizations against cyber threats. However, despite the efforts of security personnel and the existence of risk management systems, many organizations continue to encounter issues. It is crucial to acknowledge that the clunkiness of information security risk management – and the subsequent misunderstandings – can be major obstacles to achieving effective risk mitigation.

Harnessing Intelligence Powered Cybersecurity in the Cloud

As businesses increasingly embrace cloud computing to enhance their operations, the need for robust cybersecurity measures becomes paramount. Traditional cybersecurity approaches often fall short in protecting cloud environments against ever-evolving cyber threats. This is why today we are excited to announce that we are expanding our CleanINTERNET® service to the cloud.

Why Your Business Needs a Data Loss Prevention Strategy

Being a business leader in today’s business environment is no walk in the park. With over 2,200 cybersecurity attacks occurring daily, the task of protecting valuable business data adds an extra layer of complexity to your plate. How do you safeguard your crucial data, ensuring it’s not lost or compromised? You need a comprehensive Data Loss Prevention (DLP) strategy fortified by the best IT security software.

The Ultimate Guide to Classifying Exposed Credentials and Secrets

When looking for programmatic secrets, it’s not easy to figure out what is truly sensitive and how high-risk it is. There are many different types of secrets and credentials, and the context makes a difference. For example, there could be public URLs with tokens in them, public UUIDs, or credentials used in frontend code — these could all be considered API keys or secrets, but not necessarily at the same degree of sensitivity/severity as something like AWS credentials.

Elastic and AWS - Securing the cloud, together

Elastic is pleased to announce that we have recently achieved the AWS Security Independent Software Vendor (ISV) Competency Partner status with specialization in Threat and Detection Response (SIEM, SOAR, and XDR). This recognition highlights our commitment to providing you, our customers, with advanced security capabilities that can help you protect your sensitive data and applications in the cloud.