Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How to add a Google Workspace organization as a Datasource for Backup

In this BDRSuite demo, I'll guide you through adding Google Workspace Organization as a Data Source in BDRSuite Backup Server BDRSuite provides a complete backup solution for your Google Workspace data, covering user mailboxes, Google Drive, calendars, contacts, and shared drives. It also features flexible storage options, data export in formats like PST, and much more.

What you should know about PHP code security

When it comes to web development, PHP is a widely used scripting language. With its popularity, it is crucial to understand the potential security risks associated with PHP and the measures to mitigate them. Whether you deploy CMS applications using WordPress or build enterprise applications with the Laravel PHP framework, the importance of PHP security and the business impact of some notable PHP interpreter vulnerabilities are crucial for developers to get right.

A Peek Inside Fireblocks Tokenization Engine: The Backbone of Your Tokenization Solution

Fireblocks offers businesses a broad suite of solutions to meet all of their tokenization needs. The Fireblocks Tokenization Engine — only one part of our ecosystem — is a platform powering the future of financial markets and digital asset ownership. Businesses can use the Tokenization Engine to launch and manage any tokenization solution and securely mint, custody, distribute, and manage tokenized assets.

TCPRS Tanium Certified Professional Endpoint Risk and Security - Certification - Tech Talks #103

Welcome to this segment of the Tanium certification series. Today's exam covers some of the most popular use cases and modules of Tanium in the risk, security, and compliance areas. We're talking about the brand new TCPRS exam, Tanium Certified Professional - Endpoint Risk & Security. As with other exams in this series, I've invited one of the specialists who helped author the exam questions to give us an inside look at what is covered and to help us prepare for this exam.

TCPEM Tanium Certified Professional Endpoint Management - Certification - Tanium Tech Talks #102

Welcome to this installment of the Tanium certification series. Today's exam covers some of the most popular use cases and modules of Tanium in the operations area. We're talking about the TCPEM exam, Tanium Certified Professional - Endpoint Management. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare for this exam.

TCSCD Tanium Certified Specialist Cloud Deployment - Certification Series - Tanium Tech Talks #101

Welcome to this installment of the Tanium certification series. Today's exam covers key knowledge for planning and deploying Tanium in the cloud. We're talking about the TCSCD exam, Tanium Certified Specialist Cloud Deployment. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare.

Is your SIEM ready for the AI era? Essential insights and preparations

A head-spinning series of acquisitions and mergers is transforming the security information and event management (SIEM) market. Behind this market shakeup is the ongoing technological shift from traditional, manually intensive SIEM solutions to AI-driven security analytics. Legacy systems — characterized by manual processes for log management, investigation, and response — no longer effectively address today’s fast-evolving cyber threats.

How SASE and the Internet Took Over Wide Area Networks (Part 2)

This blog is part of the ongoing “I&O Perspectives” series, which features insights from industry experts about the impact of current threats, networking, and other cybersecurity trends. In the first part of this blog series, we observed the inception of an internet-based model where corporate networks have no borders anymore, home is the office, applications are in the cloud. This paradigm shift makes connectivity ubiquitous. But security risks have dramatically increased.