Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Fraud Alert vs Credit Freeze: Which One Should I Use?

Both fraud alerts and credit freezes are free of charge, but there are some differences between the two you should be aware of if you’re deciding on placing one over the other. Both fraud alerts and credit freezes are meant to protect you from identity theft and fraud, however, fraud alerts add an extra layer of verification and only last a year, whereas credit freezes prevent new credit from being opened and don’t expire.

New CIP standards: Why utilities shouldn't wait to deploy

On May 9, the North American Electric Reliability Corporation (NERC) officially adopted new Critical Infrastructure Protection (CIP) requirements for Internal Network Security Monitoring (INSM). This is one of the last steps before Federal regulators make it an official standard for utilities and the electrical power grid industry. What does it mean? Compliance for CIP-015-1 is coming to your utility. Utilities will need monitoring tools with deep and wide asset intelligence and network control.

What's going on? The power of normalization in Cloud SIEM

Many of us in the information security sphere have sat in front of a console and furiously executed various queries while either mumbling internally or externally, with varying levels of stress and frustration: what is going on? When investigating a particular system, an odd event, or a declared incident, we are all attempting to answer this question in one way or another. Detections, documented threat hunts and security operations procedures do not manifest out of thin air.

Revolutionizing Security: Brivo's Unified Platform for Enhanced Collaboration

Dive into the world of advanced security with Brivo's groundbreaking collaborative framework. In this video, we explore how Brivo is changing the game by fostering open collaboration among providers to create an integrated security environment. Discover how this approach allows customers to control and respond to events from a single platform, making security management more efficient and effective than ever before.

Gap Analysis - Leverage what you do now to set yourself up for success in the future as well.

How TrustCloud leverages the work you do now and sets you up for success in the future as well. Gap analysis is designed to give you insight into other compliance standards and your gaps with them. If you are looking to pursue other standards, this tool is great for determining the level of effort required from your team.

ChatGPT: A Tool for Attackers and Defenders

ChatGPT impresses everyone with its writing capabilities; however, its proficiency in understanding and generating human-like text has inadvertently empowered threat actors to produce realistic and error-free phishing emails, which can be challenging to detect. The use of ChatGPT in cyberattacks poses a significant threat, particularly for attackers whose first language isn’t English. This tool helps them overcome language barriers, enabling the creation of more convincing phishing content.

Beyond Tech: Shaping Cybersecurity Through Strategic Influence

Robert Black discusses the misconception of cybersecurity as purely a technical issue. He highlights the importance of shaping opinions and strategies, reflecting on the National Cyber Force's cognitive effect strategy. Discover why cybersecurity requires more than just technical expertise.