Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Shields Up: Defending Your Data & Identities with Data Security Posture Management

In today’s evolving threat landscape, protecting your data and identities is more critical than ever. In this snippet from an expert-led session, Netwrix specialists Adam Laub and Jeff Warren explore how Data Security Posture Management (DSPM) and a layered defense strategy can strengthen your cybersecurity approach. You’ll learn how to: Whether you're focused on compliance, identity protection, or data exposure mitigation, this webinar offers actionable insights and practical use cases to help you build a more resilient security framework.

The Howler - Episode 17: Kerri Shafer Page, Vice President of Incident Response

This month, we sit down with Kerri Shafer-Page, Vice President of Incident Response, as she shares a peak behind the curtain of the day-to-day of her and her team, reflections on being a woman in tech, and so much more! Kerri Shafer-Page serves as the Vice President of Digital Forensics and Incident Response at Arctic Wolf. A proven leader in threat identification, IT security and data privacy incident response and mitigation, Kerri has served in leadership roles at IBM and AIG, overseeing incident response and cybersecurity claims.

POAM Process Automation: Breaking the Manual Grind

Plans of Action and Milestones (POAM) play a critical role in public sector cybersecurity. In this webinar with government IT solutions provider Carahsoft, we break down the challenges security teams face when implementing POAMs, sharing real-life examples of where things go wrong and why. As part of the presentation, we also cover the intensive math of POAM programs: people, systems, and time.

March 24, 2025 Cyber Threat Intelligence Briefing

March 24, 2025 Cyber Threat Intelligence Briefing This week’s briefing covers: KTA134 (BLACKBASTA) Chats Suggests Help From Russian Officials Upon review of leaked chat logs, it appears that KTA248 (Oleg Nefedov, GG, Tramp, Kurva) was able to evade trial by eliciting the help of Russian government officials. Supply Chain Attack Leaks Secrets from GitHub A supply chain attack on the popular GitHub Action tj-actions/changed-files caused many repositories to leak their secrets over the weekend.