Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

7 reasons why Endpoint Security and Response shouldn't be ignored

When strategizing a security approach for the coming year, many solutions will cross a CISO’s desk, all useful in covering some part of the network. Organizations must scrutinize every layer and each solution to make sure their security stack runs efficiently while still boasting a Defense-in-Depth approach. There cannot be an overload of alerts, the learning curve must be worth the cost, and all solutions must integrate with each other.

A Study on the Security Measures Used by Top Operating Systems

An Operating System (OS) is the software that acts as a bridge between the computer hardware and the applications being run on the computer. It is responsible for managing and controlling the computer’s resources such as memory, processors, and input/output devices. The OS provides a user-friendly interface for users to interact with the computer, making it easier for users to perform tasks like file management, launching applications, and configuring system settings.

Cybersecurity Threats in Europe: What You Need to Know and What to Do About Them

As governments and organizations standardize and harmonize their responses to better mitigate the increasing number of cyber-attacks, so do cybercriminals. In Europe, security decision-makers and businesses face similar attack techniques as their global counterparts. While the methodologies employed are identical because they all rely on the same digital technologies exploiting similar vulnerabilities, the motivations vary.

Phishing attacks: The phisherman, the phish, the bait and the hook

There’s a good chance that you have heard the word phishing or probably even been a victim in the past, however you do not understand what it really means and how to protect yourself from being a victim. According to CNBC, there were 225 million phishing attacks in 2022 which depicts a 61% increase from the number of reported cases in 2021.

Cloud Keys on Public GitHub, Ransomware & Other SaaS AppSec Stories | Alok (CTO, Goodmeetings)

🎙️ In this podcast, Alok Mishra (Co-Founder & CTO, Goodmeetings) discusses with Venky how he looks at security as a vital part of building any SaaS business. He shares his unplanned appointment with a Ransomware attacker and how it led him to build best practices to deal with Application Security problems. He even talks about some common security demands from customers and how fulfilling the expectations is a must for organizations 🧳

Coffee Talk with SURGe!

Grab a cup of coffee and join David Bianco, Shannon Davis, and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: David Bianco and Shannon Davis also competed in a charity challenge comparing the pros and cons of the Pyramid of Pain, a conceptual model created by David to order indicators of compromise (IOCs) by the pain they cause adversaries when the IOCs are not available to them.

Dialing-up Data to Tackle Expanding Security Challenges

Many security professionals feel like broken records at this point when we say, “the threat landscape is constantly evolving”, and especially when we talk about how security operations centers (SOCs) are always trying to do more with less. But over the last couple of years, what we think of as standard security issues have evolved into several new, daunting challenges.