Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Vendor Risk Management Assessment Matrix (Clearly Defined)

A vendor risk management assessment matrix could enhance your visibility into vendor risk exposure, helping you make more efficient risk management decisions. In this post, explain what a vendor risk assessment matrix is, how to use it, and provide a step-by-step guide for designing your own.

How to Save Your SOC Analysts From Alert Fatigue

SecOps teams face an unyielding barrage of security signals raised by various systems and tools. It’s estimated that 56% of large companies receive 1,000 or more alerts per day. SOC analysts are expected to wade through these alerts and determine which ones are important, which are low priority, and which are imperative. According to IDC, 83% of cybersecurity employees say they’re struggling to cope with the overwhelming alert volume.

CVE-2024-3400 - PAN-OS OS Command Injection Vulnerability in GlobalProtect Gateway

Unauthenticated, remote attackers can execute arbitrary OS commands with root privileges against certain Palo Alto’s GlobalProtect firewalls, using a just announced critical severity vulnerability which is being actively exploited in the wild. While limited to specific versions and configurations, unauthenticated remote command execution vulnerabilities are among the most severe security vulnerabilities that exist. Indeed, CVE-2024-3400 has a critical 10 out of 10 rating under CVSS.

Top Security Threats Worldwide Q4 2023

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s Q4 2023 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and midsized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

Keeper 101 | Enterprise - How to Install Keeper Commander CLI

Keeper Commander is a command-line and SDK interface to Keeper® Password Manager. Commander can be used to access and control your Keeper vault, perform administrative functions (such as end-user onboarding and data import/export), run reports and create custom automations. Keeper Commander is an open source project with contributions from Keeper's engineering team and partners. Keeper recommends installing Commander using the binary installation. On the Commander Github page, the current commander build is always available via the releases link.

Remediating Mars' Cloud Security Risks with Wiz & Tines

93% of security practitioners believe that more automation would improve the work they produce. Join us as we explore how Mars used Tines & Wiz to identify and remediate security risks within their cloud infrastructure with automated workflows. Along with insights on how to leverage Tines and Wiz, webinar attendees will hear directly from Mars about the impact these platforms have had on their business resilience and security culture.

Best LLM Security Tools of 2024: Safeguarding Your Large Language Models

As large language models (LLMs) continue to push the boundaries of natural language processing, their widespread adoption across various industries has highlighted the critical need for robust security measures. These powerful AI systems, while immensely beneficial, are not immune to potential risks and vulnerabilities. In 2024, the landscape of LLM security tools has evolved to address the unique challenges posed by these advanced models, ensuring their safe and responsible deployment.

#DidYouKnow? Rogue Devices are a Threat to Your Network

#DidYouKnow? Rogue devices are a serious threat to your network! It doesn't matter if it's an unauthorized game console an employee added, or hacker plugging into an exposed ethernet port. Knowing what you have and what you should have helps you ensure you take devices off your network that shouldn't be there. #NAC #cybersecurity #rogue #networksecurity