Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Unlock the Power of Security Automation: 3 Use Cases to Consider

At ThreatQuotient, we write a lot about security automation. Most recently, we’ve discussed how our data-driven approach to automation helps enable extended detection and response (XDR) in all phases of security operations including detection, investigation and response.

How To Integrate Endpoint DLP Into Your Company's Security Policy

Even before the pandemic, many companies had a relaxed approach to the devices employees brought to work. In fact, many businesses had BYOD (bring your own device) policies that allowed team members to work on personal laptops or cell phones. By one account, 75% of employees use their personal cell phones for work. The rise of remote work has only escalated the use of tablets, laptops, and mobile phones for professional use.

Data Loss Prevention: Fundamentals and Best Practices

Every year, business owners grapple with the same question: how can I keep my data safe? The cost of a data leak can quickly escalate to over $7 million per incident, not to mention the damage to a business’s brand reputation and competitive advantage. And, unfortunately, cyber attacks are getting more sophisticated every year. There are many solutions on the market to help businesses protect their information.

What You Need to Know About Linux Auditing

None of us want to look into a production audit system, as this most likely happens after a security breach or a security incident. Over the years, people have come up with many ideas to see what applications are doing. Almost all databases keep event logs to prevent data loss. Systems such as Kubernetes generate events for every action, and applications that probably run in your production also implement some structured logging for the same reason. But what can we do if all of that is not enough?

Machine Learning, AI, & Cyber Security Part 2: Malicious Actors | Razorwire Podcast

- Machine Learning, AI & Cyber Security Part 2: Malicious Actors Welcome to a new episode of the Razorwire Podcast! Welcome to part two of our episode on Machine Learning, AI and Cyber Security. In part one, we discussed what it will be like for us as security professionals when we have access to AI tools, what we are doing with them now and how we could use them in future. In part two, we are re-joined by our guests Oliver Rochford of Securonix and Jonathan Care, a mentor of mine who specialises in cyber security and fraud detection.

OPA vs. XACML: Which Is Better for Authorization?

Modern microservices applications built using containers are complex — often requiring complex authorization solutions, due to the sheer number of access possibilities involved. Indeed, as IT infrastructure has migrated to the cloud, along with the applications running on it, security and privacy concerns have only increased. As microservice applications became ubiquitous, open-source authorization tools have come to the fore for many organizations.