Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Effective is Threat Hunting for Organizations?

In recent years, threat hunting has become much more widely adopted, but today the definition of threat hunting is still quite a controversial topic. Threat hunting is the art of finding the unknown in your environment, going beyond traditional detection technologies, with active cyber defence activity, proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.

Sysdig achieves Red Hat Vulnerability Scanner Certification

Image vulnerability scanning is a critical first line of defense for security with containers and Kubernetes. Today, Red Hat recognized Sysdig as a certified Red Hat security partner based on our work to standardize on Red Hat’s published security data with Sysdig Secure.

Public Documents and Attack Reconnaissance | UpGuard Summit February 2021

The most frequently used types of documents are often the least monitored, and most vulnerable to opening the door to a cyber attack. Join UpGuard's VP of CyberResearch, Greg Pollock, as he discusses these problems and more. Greg gives us insights into UpGuard's recent into public document vulnerabilities.

Panel Discussion on Third Party Risk Management | UpGuard Summit February 2021

Third Party Risk Management (TPRM) is a relatively new area of focus for a lot of companies. As the world becomes more and more connected, all companies, no matter their size or location, have a responsibility to be aware of any risks to their business , including any risks that vendors might bring across as part of that working relationship. Join world leaders in cybersecurity as they discuss the need for implementing strong Third Party Risk Management programs to maintain good security posture.

Cloud Threats Memo: Hard Times for ARM-based Mac M1 Processors

The Cloud Threats Memo is a weekly series from Paolo Passeri, digging into a recent cloud threat and highlighting how Netskope can best help mitigate it. Just a few months after their debut in November 2020, the new ARM-based Mac M1 Processors have already attracted the unwanted attention of cybercriminals with two adware samples, the details of which have been revealed over the past few days.

XSS Attack Examples and Mitigations

Cross-site scripting (XSS) is an attack that allows JavaScript from one site to run on another. XSS is interesting not due to the technical difficulty of the attack but rather because it exploits some of the core security mechanisms of web browsers and because of its sheer pervasiveness. Understanding XSS and its mitigations provides substantial insight into how the web works and how sites are safely (and unsafely) isolated from each other.

How to prevent supply chain attacks with the Zero Trust Architecture

The SolarWinds supply chain attack has rocked the business world, stirring a whirlwind of supply chain security evaluations. The pernicious effects of the SolarWinds cyberattack (which is likely to take months to fully comprehend) reveals an uncomfortable truth causing stakeholders globally to reconsider their business model - vendors introduce a significant security risk to an organization.

Dear CISO

As security practitioners, we all have things we want to be able to tell our CISO’s. We need to tell them we need more money, more headcount, we need to be able to tell them their baby (security program) is ugly. Everyone wants the ear of a CISO for the dollars they control. We just want their ear to help them understand what’s really going on in the industry and in their organization.