Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Automating insider threat monitoring

From ingestion of relevant data sources to automation around threat monitoring, the security engineering team at Netskope utilizes Sumo Logic as a key tool in the protection of their intellectual property. Join this session to learn how something that began as an idea for an easy-to-use dashboards developed into a near completely automated process for data collection and correlation for investigating suspicious activity.

Trustwave Recognized in Gartner 2022 Market Guide for Managed SIEM Services

Trustwave, a leading provider of Managed Security Services, has been named a Representative Vendor in the Gartner® 2022 Market Guide for Managed SIEM Services. In the report, Gartner analysts Al Price, John Collins, Andrew Davies, Mitchell Schneider, and Angel Berrios provide an updated definition of Managed SIEM Services along with how Managed SIEM, which is also known as a managed SoC or SoC as a service.

Overheard at the SANS Security Awareness Summit 2022

People have become the primary attack vector for cyber attackers around the world. As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals are concerned about are phishing, business email compromise (BEC) and ransomware, all closely related to human behavior.

SOLR vs. Elasticsearch: What's the best search engine for 2022?

While modern businesses depend on data to stay ahead of the competition, data alone isn’t enough. They also need efficient search engines to quickly index and search through millions of records to make sense of the data. Today we’re looking into SOLR and Elasticsearch, the two heavyweights in this domain, to compare their performance differences and use cases.

The 4-step plan to fortify your organization against cybersecurity threats

In today's technologically driven environment, security breaches are inevitable and cyber threats are plentiful. A fail-proof cybersecurity strategy has thus become the need of the hour. But how do you strategize a plan that accounts for this growing variety of threat actors? Join us for an insightful webinar where we'll build an effective cybersecurity strategy.

Fuzz Testing Automotive Software With Dependencies

The new ISO/SAE 21434 increases the requirement for security testing in the automotive domain. Car manufacturers must now provide advanced security tests for each software component, as part of the validation process. This includes either, penetration testing, vulnerability scanning and/or fuzz testing. But especially the early adoption of fuzz testing is currently becoming best practice among German car manufacturers.

Fuzzing Web Services | How to Automate Security Testing for Web Applications

Due to their high degree of interconnectivity, web applications are often difficult to secure. In this coding session, Simon Resch demonstrates an approach that allows you to simplify and automate your web application testing using modern fuzzing techniques. Content

How to Keep your Web Applications Secure: Everything you need to know about Fuzzing

In this coding session, Khaled Yakdan will demonstrate how to secure web applications with fuzzing, and explain how fuzz testing can help you to uncover complex security vulnerabilities, such as Denial of Services (DoS) and Uncaught Exceptions, in your source code. Content

Mocking Embedded Systems With Fuzz Data

In this live coding session, Daniel Teuchert shows you how to mock embedded systems with fuzz data. This approach enables you to use the advanced mutation methods of feedback-based fuzzing to simulate the behavior of external sources under realistic circumstances and cover unexpected and unlikely edge cases.