Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What You Need to know about API security

When people talk about complex, interconnected ecosystems, they’re really talking about how applications share data and communicate with each other. Like the air-lock on a spaceship lets people pass between physical environments, Application Programming Interfaces (APIs) enable data to pass between digital environments. However, since APIs act as access points between applications, they create potential security risks.

10 rules for security leadership

I have worked as a security leader since the early commercial days of the internet, where the CISO role only existed in some areas of financial services. Participating in the growth and maturity of security as a business function has been an amazing journey. I have learned a lot of lessons on my own, through my personal experiences, or via my peers. One thing I was not able to do was learn from experienced CISOs that have time and distance to reflect on how to best be successful as a CISO.

What to expect when you're expecting a cybersecurity audit for compliance

What to expect when you’re expecting a cybersecurity audit for compliance A cybersecurity audit is a structured evaluation or assessment conducted to determine an organization's level of compliance with relevant cybersecurity regulations, industry standards and internal policies. Read on to learn what an audit is looking for, the challenges of an audit, how to prepare for one, and the tools that can help your organization get ready.

Why your security analytics needs proactive threat hunting

Even the mightiest, most prestigious companies and enterprises are not exempt from the advanced threats of cyber attackers. In the ever-evolving cybersecurity threat landscape, an organization's security team like yours needs robust security measures for network security, endpoint security, threat detection, anomaly detection, data protection, security monitoring, application security and information security.

An Introduction to Application Security

While security teams may “run on Dunkin’,” companies run on applications. From Salesforce and Hubspot to ServiceNow and Jira, your organization relies on a complex, interconnected application ecosystem. In 2022, organizations used an average of 130 Software-as-a-Service (SaaS) applications. While these technologies enabled them to reduce costs and achieve revenue targets, they created new security risks.

Integrate Sigma detection rules with Datadog Cloud SIEM

As organizations grow, they naturally need to analyze logs from more data sources. But as these data sources expand in number and type, it becomes more difficult for teams to scale their security detection rules to keep up with the ever-changing threat landscape. Sigma is an open source project that aims to address this challenge. By leveraging the expertise of the open source community, Sigma enables security teams to implement out-of-the-box rules that cover a wide range of threat scenarios.

Threat hunting with Sumo Logic: The Command Line

Consider the following scenario: you are asked by your leadership to find dedicated time for threat hunting activities within your network. After some time, access to the shiny new tool of choice is granted and you are super excited to get started. You log into the tool and are greeted with a lovely search bar; how do you proceed from here? The tool presenting the blank search bar is undoubtedly powerful and feature packed.

Centralized Log Management for TISAX Compliance

The Trusted Information Security Assessment Exchange (TISAX) is the certification process for engaging in the Verband der Automobilindustrie (VDA), the German Association of the Automotive Industry, Information Security Assessment (ISA). The ENX Association, a collection of automobile manufacturers, suppliers, and four national automotive associations, established TISAX to create an overarching industry standard and make reporting more efficient.