Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

5 Key Cybersecurity Insights from The World Economic Forum in Davos

SecurityScorecard has been in Davos, Switzerland for the past week with heads of state, CEOs, and other global leaders as part of the 2023 World Economic Forum’s Annual Meeting. Along with climate change, sustainability, and geopolitical complexities, cybersecurity is one of the hottest topics of WEF’s official programming and the myriad private events that are part of the Davos annual experience.

Sysdig a Leader in Frost Radar, CNAPP 2022

Frost & Sullivan has named Sysdig a Leader in its recent research, Frost Radar™: Cloud-Native Application Protection Platforms (CNAPP). The independent report ranks Sysdig as a top vendor in both innovation and growth, putting special emphasis on the strength of Sysdig’s technology and market vision compared to competitors in the space.

Protect your cloud infrastructure at scale with Wiz and Tines

Increased cloud adoption has introduced new security risks; organizations need to protect invaluable, sensitive data that can be accessed from anywhere. Traditional methods no longer suffice - today’s security operations teams must adopt innovative solutions and streamlined processes to effectively manage the increase in complexity and ensure mission-critical cloud loads are safeguarded.

From Registry With Love: Malware Registry Abuses

The Windows Registry is one of the most powerful Windows operating system features that can tweak or manipulate Windows policies and low-level configuration settings. Because of this capability, most malware or adversaries abuse this hierarchical database to perform malicious tasks on a victim host or environment. Over the last 2 years, the Splunk Threat Research Team has analyzed and reverse engineered some of the most prevalent and successful malware families.

Cloud Threats Memo: Threat Actors Continue to Abuse Cloud Services to Deliver Malware in 2023

Our most recent Cloud and Threat Report highlighted how threat actors abuse cloud services (with a special focus on cloud storage apps) to deliver malicious content (and yes, OneDrive leads the chart of the most exploited apps). To confirm that this trend will likely continue in 2023, researchers at Trend Micro have discovered an active campaign, launched by a threat actor named Earth Bogle.

How to Strategically Scale Your SOC Response with Automation - Webinar

SOC teams have to operationalize greater amounts of data from more diverse sources than ever before. Operationalizing that data for greater security requires scaling teams and automating processes—both of which are consistently named as the most challenging aspects of managing a SOC. @ESGglobal and @torq_io explore real-world survey responses from IT and cybersecurity professionals around the opportunities and challenges they face and look at the ways that no-code security automation platforms like Torq can help them overcome many of the biggest obstacles.

Preparing for Your Digital Afterlife With Secure Password Management

With the average person spending about two and a half hours on social media daily and possibly up to six hours on the internet, there’s no doubt we’ve all built a legacy on the web. Have you ever thought about what happens after you pass away? Will your online presence turn into ghost accounts that are inaccessible to loved ones and susceptible to attackers?