Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Tanium Podcast | Pair real-time data with autonomous power with Tanium Automate

“What level of automation are we talking about here? I mean, because I still won't get in a car that doesn't have a human at the wheel.” With Tanium Automate, you can codify (and simplify) complex manual security tasks, saving time, reducing errors, and yes, keeping a human at the wheel. HOST: Doug Thompson, chief education architect, Tanium GUESTS: Steven Yang, director of product management, Tanium.

How we use Datadog for detection as code

Detection as code (DaC) is a methodology that treats threat detection logic and security operations processes as code. It involves applying software engineering best practices to implement and manage detection rules and response runbooks. This approach addresses many of the pain points associated with traditional security operations.

NIST: Time to end expiring passwords

Passwords are bad, and our whole industry is trying to move away from these simple strings granting access to our systems. But change is slow, and adopting newer standards is difficult, even if passwords are deeply problematic. Now, the National Institute of Standards and Technology (NIST) is updating the core standard for authentication – and it adopts the “new school” of password policies.

Penetration Test Point of Contact: Ensuring Effective Security Coordination

In today's complicated digital world, cyber threats are always coming at companies. Organizations need to do regular penetration testing to find security holes and evaluate their security stance in order to protect their valuable assets and keep their operations running smoothly. Having a named penetration test point of contact (PTPOC) is a key part of any penetration test that goes well.

Australia Enacts Landmark Cybersecurity Legislation: The Cyber Security Bill 2024

On October 9, 2024, the Australian government took a significant step in fortifying its cyber defenses by introducing the Cyber Security Bill 2024 to Parliament. This pioneering legislation marks the country's first standalone cybersecurity law, designed to enhance protections for both citizens and organizations amid escalating geopolitical and cyber threats. By implementing comprehensive measures, Australia aims to safeguard critical infrastructure and ensure a more secure digital environment.

Massive AI Call Center Data Breach: 10 million Conversations Leaked, Heightening Fraud Risks

In a significant breach, over 10 million customer conversations from an AI-powered call center platform in the Middle East have been exposed. This incident has raised alarm bells regarding the security vulnerabilities of AI platforms widely used in sectors such as fintech and e-commerce. As AI platforms become integral to business operations, the risks of compromised data tracking and brand impersonation have also escalated.

Outlook Bug Causes Global Disruptions: Microsoft Investigates Login Failures and High Memory Usage

Microsoft is currently investigating a significant issue affecting its Outlook desktop app, with users experiencing a range of problems, including crashes, high memory consumption, and login failures. Initially believed to impact only European users, the issue has now been reported by users globally, signaling a more widespread problem. In addition to the desktop app, some users have experienced similar issues while using Outlook on the web (OWA), making this a pressing matter for Microsoft to address.

Top Privileged Access Management (PAM) Solutions for Secure Access

The privileged accounts in your IT environment require special attention because they have elevated access to vital systems and sensitive data. The organization can suffer severe damage if they are misused by their owners or compromised in attacks. In addition, many compliance standards require organizations to maintain tight control over privileged access. Most organizations have hundreds or thousands of accounts with privileged access.

Understanding Common Ports Used in Networks for TCP and UDP Usage

Think of a port as a virtual gateway that a specific service, process, or application on your computer uses for network communication. Each port is assigned a unique number, allowing different types of traffic to be directed to the appropriate software. For example, your email might use one port, while your web browsing uses another. When combined with an IP address, a port number creates a complete socket address, enabling precise routing of data to and from your computer across the network.