Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Automating Incident Response Workflows with LimaCharlie

As a security professional, you know that the ability to swiftly and effectively respond to threats is crucial. This live session will delve into the powerful capabilities of LimaCharlie, a SecOps Cloud Platform, for automating comprehensive Incident Response (IR) workflows. You’ll learn how to leverage LimaCharlie for a seamless and automated forensic triage acquisition, evidence processing, and forensic timeline generation.

Building Apps at Scale in Power Platform? Not for the Faint of Heart... or CoE Security

Enterprises are racing to adopt AI copilots and low-code/no-code platforms to innovate and maximize efficiency by placing powerful technology and development tools in the hands of all business users. While the productivity gains are enormous, so are the security risks, as the nature of these copilots and low-code platforms results in a surge of new business apps being created at the enterprise.

Creating symbolic links - Like shortcuts but better

The create symbolic links user right determines the users ability to create a symbolic link within Windows from the device they’re logged on to. These links point to other files or folders, just like regular shortcuts, but works in a more advanced way. Symbolic links help maintain organization and flexibility while minimizing potential security risks by giving the ability to create a link in one folder that points to a file in a different folder, making it seem like the file exists in both places.

Top Cybersecurity Certifications To Earn Today

Splunk is proud to be recognized as a Leader in SIEM by Forrester, Gartner and IDC. Download the latest Magic Quadrant to see why. Get the report → Learn more about Splunk's Security Products & Solutions: The lucrativeness of cybersecurity keeps going up, with more companies realizing the need to employ reliable people to forestall and manage cyberattacks. That means there are plenty of security jobs available...however, the right people for this job aren’t always easy to find and hire.

Scanning the Matrix: SIEM Best Practices

(A thought from The Matrix: Neo likely used a SIEM before he took the red pill and could see the matrix without one...) One of the best ways to monitor security-related activities for your organization is to collect audit logs from every network device and analyze those logs for activities which violate acceptable behavior. This is precisely the role of a SIEM or Security Information and Event Manager. Let me simplify your life by providing some best practice suggestions for deploying and using a SIEM.

How Cloudflare accelerates digital modernization efforts

You need to accelerate digital modernization to stay competitive, but complex tech stacks limit your modernization initiatives. Cloudflare’s connectivity cloud simplifies management and new tech adoption across networks, web apps, security, and development, making it easier to embrace a wide range of digital services.

Gaining Network Transparency with Asset Discovery and Compliance for IT/OT

I recently came across the "Johari Window Model" and thought this would be a good way to gain inspiration to explain the conundrum faced by many cybersecurity customers. The table below shows us the breakdown of the stages that are applicable not just to IT and OT environments but also to other facets of our daily lives. This model can be applied to asset discovery and Fortra's Security Configuration Management (SCM) system.

IoT Security Regulations: A Compliance Checklist - Part 1

The Internet of Things (IoT) refers to the global network of physical devices connected to the internet, capable of collecting and sharing data. IoT devices range from everyday household items to sophisticated industrial tools. By integrating sensors and communication hardware, IoT bridges the gap between the physical and digital worlds, enabling environments where smart devices operate interconnectedly and autonomously.