Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 11.2: Wannabe Barbie Watchtower Craze

From a wannabe rapper guilty of bitcoin laundering to scammers who are using Barbie-mania to steal personal information, we have all that and more in this episode’s Watchtower Weekly. 💰👠 We also sit-down with 1Password Business customer Vlad Boldura from Visma. He shares how Visma got started with 1Password, how they rolled it out across the organization, and the incredible impact it’s made since implementation.

Kojensi: Military-grade Sensitive & Classified Information Sharing Platform

Kojensi from archTIS is a highly secure, multi-level security platform for the secure sharing and collaboration of sensitive and classified files. By taking a data-centric, zero trust security approach, a file’s attributes such as security classification, organisation and country releasability, determine who is able to access, edit and download the file. Kojensi users can create, co-author and share documents in real-time, all in a secure and intuitive platform that ensure sensitive information remains need to know only.

NC Protect: Advanced Data Protection for Govt, Defense & Supply Chain in Microsoft 365 Applications

Empower your organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC, and ITAR for information security. archTIS’ zero trust attribute-based access control (ABAC) powered information security solutions for public sector enhance native security capabilities to empower secure collaboration within your agency, with other agencies, defense, multinational coalitions and supply chain partners.

What is Attribute Based Access Control or ABAC?

The complete portfolio of archTIS solutions, including NC Protect and Kojensi, leverage a data-centric, attribute-based access control (ABAC) methodology to ensure the highest levels of data protection. Watch this video to learn about the advantages of using ABAC-enabled access and data protection policies to safeguard sensitive data.

Introducing BinLib: Your private binary library

Binary Library, or “BinLib”, is a collection of data and metadata pertaining to executable binaries, such as EXE or ELF files, that have been observed within your organization(s). When enabled, this extension collects observed data into your own private collection of historical executables, then subsequently available for searching, tagging, and analysis. BinLib also features YARA scanning, allowing you to import rules and search across observed executables - all without impacting system resources or production systems.

Cloud Penetration Testing Service: Safeguarding Your Digital Fortresses

In this informative video, join us as we delve into the realm of cloud penetration testing services, presented by experts at Cyphere. Discover the vulnerabilities that can threaten your cloud infrastructure and learn how our cutting-edge approach addresses these challenges head-on. Gain insights into common issues faced in the digital landscape and explore how Cyphere's unique strategies ensure the security and resilience of your digital assets. Safeguard your cloud environment with knowledge and solutions that empower you to stay one step ahead of potential threats.

Keeper 101 - Advanced Reporting & Alerts Module (ARAM)

The Advanced Reporting and Alerts Module (ARAM) tracks over 200 security events across the organization and addresses many password-related cybersecurity auditing, alerting and compliance needs. This module provides insight to assess vulnerabilities related to administrative changes, password reuse, unauthorized access, password stuffing attacks and insider threats.