Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Multi-Source Telemetry: Finding Business Email Compromise

This post is the first of a multi-part blog series on various sources of telemetry. At LimaCharlie, we’re a firm believer in visibility. The more an analyst can see about their environment, the more impactful decisions they can make. We are huge fans of multi-source telemetry, bringing visibility from almost anywhere in your environment to one place for analysis, detection, and response capabilities.

Healthcare Industry Leads the Way in Fixing Software Flaws

The healthcare industry is transforming patient care through software, from 24/7 digital patient portals, to AI-fueled medical research, and everything in between. As innovation reaches new heights, how does healthcare stack up against other sectors in terms of software security flaws and the ability to remediate them?

Optimize and Automate

SecurityScorecard Co-Founder and Chief Operating Officer Sam Kassoumeh shares Tip #1 from our ebook, 5 Ways to Secure Your Organization in Turbulent Times: Optimize and automate your business ecosystem risk management (aka your third-party risk management) program - to save time and reduce risk.Your security posture is never just your security posture. In this hyperconnected cloud ecosystem, it’s a combination of your own, your vendors’, their vendors’, and so on. Learn how the cyber health of your ecosystem can grow trust and integrity with your clientbase, and also maintain business continuity.

The Critical Element Companies Are Missing in Digital Transformation Journeys

Digital transformation is no longer the exclusive domain of forward-thinking companies on the leading edge of technological advancement. It has become a cost of entry into competitive business. Digital transformation was already accelerating into the mainstream prior to the pandemic, but the jarring shift to remote and hybrid work put fuel in the proverbial jetpacks.

Discord - Fundamentals and Threats

In a world where more and more communities and businesses are based on instant messaging applications, it is just a matter of time before instant messaging takes the spotlight away from the traditional social media and commerce platforms. Instant messaging applications are more convenient than conventional forums and social media groups. However, the instant messaging realm is also divided into different application types and purposes.

Cybersecurity Offboarding: How to Protect Passwords When Employees Leave

Ending a business relationship with an employee can be daunting, especially if things end on bad terms. Offboarding is critical to ensure that any disgruntled former employees do not expose company information. There have been cases in the past where former employees are the cause of massive data breaches. Some data breaches are intentional, like when a former CIA employee was convicted for carrying out the largest data leak in the agency’s history.

Insight Into The Strengthening America Cybersecurity Act

Signed into law in March of 2022, the Strengthening American Cybersecurity Act (SACA) gives federal authorities an overview of all cyber attacks against critical infrastructure in the United States for the very first time. SACA has three parts: SACA comes at a time when governments are facing a significant paradigm shift.

Understanding Cyber Threat Intelligence

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” – Sun Tzu. The above quote by Sun Tzu summarizes cyber threat intelligence (CTI) perfectly.

Introducing Keeper MSP Upgraded Billing Platform

Keeper has updated our MSP platform and licensing to be much more flexible. This allows managed service providers and their managed companies to allocate Keeper licenses to their users and pay for those licenses at the end of the month. While other MSP solutions in the market bill upfront before licenses are allocated to users, Keeper’s new billing model is designed to scale with your MSP business as you add individual managed companies and users.