Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Rise of ZTNA: A Seamless Path to Remote Access

Working remotely using cloud applications is now the norm for getting things done. But while these shifts offer greater flexibility, they also bring new security challenges. For years, virtual private networks (VPNs) were the go-to solution for securing remote access. But when used at such a large scale, VPNs are inefficient, slowing users down and undoing the productivity gains that come along with remote work. Worse, they expose organizations to unnecessary security risks like lateral movement attacks.

How Do You Know if Your SSN Is Being Used?

To find out if someone else is using your Social Security number (SSN), you should check your credit reports, review your mySocialSecurity account and be cautious of calls from debt collectors. The idea of a stranger having such sensitive information about your identity can be terrifying. You may even be a victim of the recent data breach in which over 2.9 billion pieces of personal data were stolen from National Public Data.

What Can Someone Do With Your IP Address?

Once someone knows your IP address, they can determine your approximate location, track your online activity, impersonate you or conduct targeted DDoS attacks. Most cybercriminals will use your IP address to learn more personal information about you through phishing attacks, which can be used to identify and impersonate your internet provider.

NYSE Floor Talk with Judy Shaw ft. Torq CEO and Co-Founder, Ofer Smadari

NYSE Floor Talk with Judy Shaw ft. Torq CEO and Co-Founder, Ofer Smadari Ofer Smadari, Torq’s CEO and Co-Founder joined Floor Talk with Judy Khan Shaw to talk about Torq’s momentum from our $70M Series C and what sets Torq Hyperautomation apart from legacy technology.

API Security Essentials: What You Must Know About Positive and Negative Models #apisecurity #api

In this video, we dive into the fundamentals of API security by comparing two key security models: Positive and Negative. Learn how each model works, their pros and cons, and how to choose the right one to protect your APIs effectively.

Tanium Podcast | Pair real-time data with autonomous power with Tanium Automate

“What level of automation are we talking about here? I mean, because I still won't get in a car that doesn't have a human at the wheel.” With Tanium Automate, you can codify (and simplify) complex manual security tasks, saving time, reducing errors, and yes, keeping a human at the wheel. HOST: Doug Thompson, chief education architect, Tanium GUESTS: Steven Yang, director of product management, Tanium.

How we use Datadog for detection as code

Detection as code (DaC) is a methodology that treats threat detection logic and security operations processes as code. It involves applying software engineering best practices to implement and manage detection rules and response runbooks. This approach addresses many of the pain points associated with traditional security operations.

NIST: Time to end expiring passwords

Passwords are bad, and our whole industry is trying to move away from these simple strings granting access to our systems. But change is slow, and adopting newer standards is difficult, even if passwords are deeply problematic. Now, the National Institute of Standards and Technology (NIST) is updating the core standard for authentication – and it adopts the “new school” of password policies.

Penetration Test Point of Contact: Ensuring Effective Security Coordination

In today's complicated digital world, cyber threats are always coming at companies. Organizations need to do regular penetration testing to find security holes and evaluate their security stance in order to protect their valuable assets and keep their operations running smoothly. Having a named penetration test point of contact (PTPOC) is a key part of any penetration test that goes well.