Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Tanium Semiannual Release SAR - Tanium Tech Talks #113

The new semiannual release schedule is for customers that use Tanium on premises. The semiannual releases streamline the deployment process and enhance the stability and predictability of Tanium solutions. By transitioning from weekly updates to semiannual releases, Tanium aims to ease the work involved for Tanium administrators to plan and deploy releases. See how on-prem customers get all the enhancements already enjoyed by cloud customers in high-quality, predictable releases.

Top Tool Capabilities to Prevent AI-Powered Attacks

Recent advances in AI technologies have granted organizations and individuals alike unprecedented productivity, efficiency, and operational benefits. AI is, without question, the single most exciting emerging technology in the world. However, it also brings enormous risks. While the dystopian, AI-ruled worlds of sci-fi films are a long way off, AI is helping cyber threat actors launch attacks at a hitherto unknown scale and level of sophistication. But what are AI-powered attacks?

Streamlining IT: Integrating device security and compliance with Jamf and Tines

Unlock the potential of automation to simplify and enhance Mac and mobile device security and compliance. Join us as we explore how Tines and Jamf work together to streamline critical tasks for IT and security teams. During the webinar, we covered: Whether you’re focused on device management and security or looking to reduce manual efforts, this session will provide valuable insights for how to optimize your workflows with Tines and Jamf.

How CISOs Can Sharpen Their Board Pitch for IAM Buy-In

In a time when 94% of companies have experienced an identity-related breach, many CISOs feel the urgency to strengthen identity and access management (IAM) across their organizations. In fact, a recent survey of CISOs found that identity is the top focus area going into 2025. However, communicating IAM’s value to the board remains a challenge—it isn’t enough for these security leaders to craft effective IAM strategies—they must also secure their board’s support.

Ivanti Patches Multiple Critical-Severity Vulnerabilities in Cloud Services Application

On December 10, 2024, Ivanti released updates for three critical-severity vulnerabilities impacting their Cloud Services Application. By chaining the vulnerabilities together, a threat actor could obtain administrative privileges via authentication bypass (CVE-2024-11639), which could then allow for remote code execution (CVE-2024-11172) and/or SQL injection (CVE-2024-11173).

5 Key Data Protection Challenges and How to Overcome Them

Organizations understand their sensitive data is everywhere — and adversaries are after it. Data protection solutions have become an essential part of modern cybersecurity strategies. Organizations realize that in order to avoid a breach, they must have a plan to monitor and control data flow at the user level so they can better understand where data is going, who is accessing it and when malicious activity occurs. But when it comes to deployment and operationalization, things can get complicated.

Corelight delivers static file analysis with YARA integration

Malicious files continue to be a significant threat to organizations; SonicWall reported more than six billion malware attacks in 2023. To help organizations prepare for and stay ahead of these threats, we’re introducing an integration with YARA that offers a deeper level of inspection for files across enterprise networks while helping security teams consolidate their toolset in the process.

How to Run PowerShell on Remote Computers

PowerShell is a great scripting and automation tool — and it also enables administrators to execute commands and scripts on remote computers remotely, as if they were sitting in front of them. Indeed, early in the history of PowerShell, Microsoft added support for cmdlets to run on remote systems with the -ComputerName parameter.

Complete Checklist to User Access Reviews: Best Practices and Essential Steps

Imagine a former employee still being able to access your network or current employees wielding permissions far beyond their roles. Both scenarios sound risky, right? Excessive permissions aren’t just a minor oversight — they’re significant vulnerabilities that could lead to costly data breaches, regulatory penalties, and other problematic consequences.