Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What Is EDR Security?

Back in 2013, Gartner’s Anton Chuvakin set out to name a new set of security solutions to detect suspicious activity on endpoints. After what he called, “a long agonizing process that involved plenty of conversations with vendors, enterprises, and other analysts,” Chuvakin came up with this phrase: endpoint threat detection and response.

A Guide to Open Source Software

Open source software (OSS) is software for which the original authors have granted express copyright and usage permissions to allow all users to access, view, and modify the source code of these programs however they see fit and without the need to pay royalties. This is in contrast to proprietary, closed source software, which typically requires a paid license and cannot be added to, modified, or distributed by anyone except the owner of the rights to the software.

Asset Misappropriation: How To Protect Your Organization

Keeping money and ideas safe from outsiders is relatively easy. But what happens when you have to keep them safe from insiders? Asset misappropriation is a type of fraud that employees commit in their organizations, usually taking advantage of their position. This makes it not only harder to prevent but also difficult to identify if you don’t have the right systems in place.

Is it Time to Rethink Your Security Stack?

The cybersecurity threat landscape is constantly evolving, requiring organizations to regularly evaluate their security stack to ensure it not only offers the highest level of protection, but is operated by a firm with a long track record of developing, implementing, and properly maintaining the highest quality security tools.

FAQ: How Are STIGs, SRGs, SCAP, and CCIs Related?

In the world of government-adjacent security and compliance, there are many different terms and acronyms you’ll encounter for the processes you have to perform. Often, these terms are interrelated in a single process, so you tend to learn them in clusters. One such cluster includes STIGs, SRGs, SCAP, and CCIs. What are these, what do they mean, and what do you need to do to utilize them properly? Let’s answer the most commonly asked questions.

The Top SIEM Technical Interview Questions

If you are evaluating a new role that requires proficient knowledge of SIEM, this comprehensive guide offers an extensive list of frequently asked interview questions. Each question is paired with detailed, well-explained answers to ensure you fully understand the concepts and can confidently showcase your expertise.

The State of SME IT in the U.S.

The United States has faced some significant economic headwinds and shifts in the last few years. Even the geographical spread of wealth in the U.S. economy has shifted considerably since the pandemic. Now, an already struggling economy is forecast to continue to slow. What does this mean for small- to medium-sized enterprises (SMEs) in the U.S.? In a recent survey, JumpCloud asked this question to over 300 IT professionals working at SMEs in the U.S. Read on to learn the results.