Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Leveraging NDR for Risk-Based Alerting: A Proactive Approach to Cybersecurity

The traditional methods of detecting and mitigating cyberattacks will no longer be adequate as these attacks become sophisticated and frequent. These days, risk-based alerting and network detection and response (NDR) are regarded as essential tools for safeguarding enterprises. By avoiding false positives or low-priority warnings, risk-based alerting allows security teams to concentrate on the high-risk threats, saving time and resources.

Unlocking the Potential of GRC Tools: A Path to Strategic Risk Management

By James Rees, MD, Razorthorn Security In today’s complex cybersecurity landscape, Governance, Risk and Compliance (GRC) tools have become essential for organisations managing intricate security ecosystems. These tools are designed to centralise information, streamline processes and offer crucial insights into an organisation’s risk posture. However, as cybersecurity expert Jack Jones revealed when he joined me on a recent podcast, the reality often falls short of these ambitious claims.

Reducing False Positives in API Security: Advanced Techniques Using Machine Learning

False positives in API security are a serious problem, often resulting in wasted results and time, missing real threats, alert fatigue, and operational disruption. Fortunately, however, emerging technologies like machine learning (ML) can help organizations minimize false positives and streamline the protection of their APIs. Let's examine how.

From on-prem to cloud: Detect lateral movement in hybrid Azure environments

There are several tactics that threat actors can use to access cloud environments, services, and data. A common example is lateral movement, which involves techniques that enable a threat actor to pivot from one host to the next within an environment. This type of activity often uses other tactics, such as initial access and privilege escalation, as part of a larger attack flow.

Prescribing Strong API Security: A Lifeline for Healthcare Data

In 2024, healthcare organizations face heightened security challenges, mainly as they increasingly rely on Application Programming Interfaces (APIs) to support critical functions. APIs have become indispensable in driving digital transformation and improving operational efficiencies across healthcare systems. However, the rising complexity and volume of APIs, alongside insufficient security practices, have created a vulnerable environment ripe for exploitation.