Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Aw, HEC! Splunking Okta's Event Hooks with the HTTP Event Collector

This weekend I spent some time with Okta’s Identity Engine product, learning about various ways to integrate it with Splunk and other external systems. When I got to Okta’s Event Hooks feature, I exclaimed “Aw, HECk!” (actually I said something a little stronger) and banged my head against my old copy of "Log4J 4 Me and U - A Complete Guide" for a few hours trying to get Event Hooks sending data properly into Splunk’s HTTP Event Collector, or HEC.

Octiga Office 365 MSP DashboardOffice 365 Security

Octiga's main Office 365 security universal threat intelligence dashboard provides consistency for MSPs. It is a complete bird's eye view of all the risky events, baselines, reports, and mailboxes for each tenant. In addition, you can further dig into individual tenants to analyse various alerts and take in-app action for critical and dangerous events.

Deploy Office 365 Security Baseline in OctigaOffice 365 Security Best Practices

Office 365 security baselines help achieve a tailored desired state configuration through continuous monitoring & alerting. Octiga's intelligent baseline engine then guides you to implement Office 365 security best practices confidently. As a result, you'll be alerted of and remediate the issues for Office 365 tenants, groups or users within seconds!

Export Office 365 Security Baseline Report in Octiga for Client

Baseline reports for Office 365 tenants are essential to infer trends based on historical data to enhance client security AND provide proof of compliance. Manage client relationships by reporting them rapidly through targeted baseline security reports, tenant-wide or group-wide, generated in a single click!

Investigate Office 365 Security and Compliance Alerts in Octiga

Investigate possible Office 365 security and compliance alerts across all tenants systematically. Identify suspicious logins, external breaches, faulty inbox rules etc., and drill down into details like risk score, severity, country of the breach, connection type, & user ID, user type, to prioritise in-app remediation in clicks.

Crossword Cybersecurity supports techUK's SME Membership with Cyber Essentials certification and access to Rizikon Assurance

Crossword Cybersecurity Plc is today announcing that its online software assurance platform, Rizikon Assurance, is being made freely available to members of UK technology trade association, techUK for a single-use cyber security assessment to support them towards Cyber Essentials certification.

NFTs - Protecting the investment

This blog was written by an independent guest blogger. Non-fungible tokens (NFTs) are the new player in the financial investment market. They’ve seen tremendous interest from a wide range of parties, whether that be institutional investors or retail hobbyists looking to find an angle. As with anything involving money, malicious actors are already starting to take hold; Insider magazine recently highlighted the 265 Ethereum (roughly $1.1 million) theft due to a fraudulent NFT scheme.