Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Sergey Tokarev from Roosh: Women Integrate in Ukraine's Reconstruction

The question of Ukrainian cities' reconstruction must be already under consideration. Though dozens of cities have been completely destroyed, the full-scale Russian invasion hasn't finished yet. Therefore, various initiatives and companies joined forces to help Ukraine reconstruct its cities and develop inclusive spaces in terms of world examples. Sergey Tokarev, the founder of the Roosh tech company, commented on STEM and FEM participation in reconstruction and how this initiative will help Ukraine.

How can MSPs capitalize on business in 2023?

The managed service provider (MSP) industry continues to expand, and this trend is not likely to change any time soon. Even in the current economic situation, where recession is in sight, demand for MSPs remains strong, resulting in growth opportunities this year. This is backed by the fact that 58% of participants at WatchGuard's webinar Top 3 Growth Opportunities for MSPs in 2023 and Beyond believe that cybersecurity spending will be maintained going forwards.

Detectify's approach to asset discovery is at the forefront of the security landscape

We’re excited to announce that Detectify has been included in the 2023 Gartner Competitive Landscape for External Attack Surface Management report. This report is an important resource for External Attack Surface Management (EASM) vendors and potential customers alike, as it provides the most up-to-date insights on the EASM landscape and how various vendors are approaching attack surface management.

How to Clean Up Your Active Directory

Despite the popularity of the cloud, Microsoft Active Directory (AD) remains a crucial component of the IT infrastructure for many organizations. Indeed, Active Directory often serves as the central identity repository and provides vital authentication and authorization services — so keeping it clean and well organized is vital. Discover exactly why regular AD cleanup is critical — and the key signs of a poorly maintained AD environment.

Keeping Data and Systems Secure With Privileged Access Management

Research shows that most of today’s cyberattacks occur when a cybercriminal gains access to a system through stolen credentials. Users with extra privileges, particularly IT administrators, are often targeted by threat actors who steal those privileges to access sensitive information and take control of systems. With an increase in virtual and hybrid work, across both the public and private sectors, these kinds of attacks are only becoming more common.

Using Co-Managed SOC to Derive Maximum Value from a SIEM Investment

Security information and event management (SIEM) systems are crucial to cyber security, providing a solution for collecting and analyzing alerts from all manner of security tools, network infrastructure, and applications. But simply having a SIEM is not enough because to be truly effective, it must be properly configured, managed, and monitored 24x7.

CommScope Hit By a Ransomware Attack Putting Employees at Risk

CommScope is a massive tech company with more than 30,000 employees. The organization works with companies around the world and helps to establish network infrastructure systems for hospitals, schools, federal agencies, and more. CommScope is based out of Hickory, North Carolina, and has been in business since 1976. The massive company has an annual revenue of 9.23 billion USD and manages substantial networks for businesses throughout the United States.