Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

ITSM Walkthrough - ServiceNow Integration - Tanium Tech Talks #86

See how to configure the Tanium integration for powering the ServiceNow service desk experience with real-time visibility and control on today's Tanium Tech Talk. Watch the guided setup, take note of implementation considerations, plan for user permissions, and do more with the info in this video. VIDEOS IN THIS SERIES CHAPTERS.

The Definitive Guide to Endpoint Data Loss Prevention

Backup and recovery solutions, anti-malware tools, data encryption tools, and network security tools—how much protection is really enough to prevent endpoint data loss? In this article, we’ll go over everything you need to know about endpoint data loss prevention, including the types of DLP, specific activities you can monitor, how endpoint DLP software can help, and more.

LimaCharlie Slashes Incident Response Times With New Bi-directional Capabilities

LimaCharlie introduces a new bi-directional integration platform enhancement, which allows for two-way data flows that streamline detection and response processes while eliminating reliance on third-party automation applications.

What To Know About Endpoint Monitoring in 2024

Today’s workforce is more distributed than ever. Globally, 16% of companies are fully remote, while 40% have a hybrid arrangement. As workforces become increasingly distributed, security leaders face many challenges. They must monitor potential malicious activity across a wide array of devices scattered throughout the entire network. With the rise of endpoint monitoring tools, it has become easier to monitor devices. But challenges remain.

Trustwave Government Solutions (TGS) Salutes New Mexico's New Cybersecurity Executive Order

New Mexico Governor Michelle Lujan Grisham issued an Executive Order to shore up the state’s cybersecurity readiness and better safeguard sensitive data by conducting a state-wide security assessment and adopting National Institute of Standards and Technology (NIST) standards by Nov. 1, 2024.

How a Network Digital Twin Helps Overcome One of the Most Significant IT Challenges: Technical Debt

Rodney Alto served 35 years as a senior executive in technology at the Central Intelligence Agency. He’s now a senior advisor for federal strategy and security at Forward Networks. What is one of largest challenges today in IT? It’s not AI, quantum computing, or even cyber—it’s technical debt.

What Are the Five Pillars of Zero-Trust Security?

The zero trust maturity model is a Cybersecurity and Infrastructure Security Agency (CISA) initiative to help achieve a modern approach of zero trust through the implementation of five pillars with cross-cutting capabilities. The five pillars of zero-trust security are identity, device, network, application and workload and data.