Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Banshee Stealer is Redefining macOS Cyber Threats and Data Theft

MacOS, often regarded for its robust security measures, has increasingly become a target for sophisticated cyber threats. Among the latest examples is Banshee Stealer, a malware engineered to compromise macOS systems by extracting sensitive user information. Developed by Russian cybercriminals and offered at a premium subscription fee of $3,000 per month, this malware underscores the growing attention of threat actors toward macOS platforms.

Why User Activity Monitoring (UAM) is a Must for SMBs

The evolution of the professional work environment and digital transformation continues to challenge the boundaries of traditional workforce management systems and practices. With 28% of workers worldwide working from home at least one day a week, gaining visibility into the digital behavior of the workforce is paramount to effective and secure management.

Webinar: Mitigating Benefit Threat through Rapid Data Processing & AI Modeling

With EBT SNAP fraud on the rise, safeguarding our most vulnerable populations is a growing challenge across the U.S. This webinar will equip you with actionable strategies to protect the integrity of EBT beneficiary cards and merchant acceptance. Learn tips and tricks related to sharing transaction data insights, detecting malicious EBT transactions with speed and accuracy, and implementing risk scoring and behavioral analysis without bias. Leave with new ideas to enhance your EBT fraud strategy efficiently and effectively--without taxing your team or your budgets.

The Cost of Being A CISO - Part: 1Personal, Professional & Organisational Challenges

Join us for part one of our two-part series examining the world of Chief Information Security Officers. This episode welcomes back Richard Cassidy, Field CISO at Rubrik, and Oliver Rochford, former Gartner analyst and founder of Cyberfuturist. This episode offers insights that will give you insight into what makes security leadership successful - and what can lead to failure.

It's Tuesday: Do You Know if You're Compromised?

How do you know that your organization is not breached at this very moment? Many threats are designed to lurk in the shadows, going undetected before causing damage and extracting confidential data from unassuming organizations. And a traditional threat hunt searching for known Indicators of Compromise (IoCs) doesn’t always detect the threats designed to evade.

To the Point: Top State CIO and CISO Priorities for Tomorrow's Landscape with Teri Takai

In this episode of To the Point, Teri Takai, Senior Vice President for the Center for Digital Government, and renowned public-sector technology leader, brings her wealth of experience to highlight the shifting priorities for state CIOs and CISOs as they prepare for the complexities that they face in a constantly evolving cyber landscape. From AI safeguards to the critical role of data management, this episode provides actionable insights for IT leaders at every level.

Tanium Converge 2024 Recap - Tanium Tech Talks

Tanium Converge 2024 announced some amazing tech! Join two Tanium talkers for an insiders look as we review what happened during this special week. Find out which keynotes to watch on-demand for free. Also check out the other in-person Converge interviews on the Tanium Tech Talks playlist on the channel here. Will we see you there in 2025? Tanium's 2024 Converge user conference was held November 17-21 in Orlando, Florida. Converge 2025 will be in Orlando, Florida, November 17-20.#CatchMeAtConverge.