Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Endpoint Security?

Endpoints are a continuous target for threat actors. They serve as gateways to the overall network, meaning an attack that starts on a single endpoint can quickly spread across the attack surface. They offer a valuable entry point into an organization’s environment that can be used to launch sophisticated cyber attacks.

Insights From The SOC

A review of AI-generated malware, and how a SOC might deal with the ever-increasing threat… Theofanis Dimakis, SOC Officer, and Nikolaos Tsompanidis, Threat Detection & Response Expert at Obrela, speaking during the recent CRESTCon Europe event, shared insights from their perspective into detecting malware, including the rising tide of AI variants.

11 Questions to Ask When Shifting Your SOC Strategy

No one feels the pain of ransomware and other disruptive and costly digital cybersecurity attacks more than the people managing the day-to-day in your SOC (Security Operations Center). At 13 attacks every second in 2023, cybercriminals, fraudsters and nation-state hacktivists are overwhelming SOC analysts. Nearly two-thirds (63%) of SOC analysts report the size of the attack surface has increased. At the same time, CISOs and SOC managers are struggling to handle on-the-job analyst burnout and turnover.

Security Live with AWS and Arctic Wolf

Each episode of Security Live features AWS and AWS Partners who are working to solve security challenges for customers. And few companies are doing that with the scale, speed, and efficiency of Arctic Wolf. In this episode, Arctic Wolf CISO Adam Marre explains how Arctic Wolf is solving the operations problem in the cybersecurity industry by providing the platform and human element to help organizations get the outcomes they need out of the tools in their tech stack.

Tips To Stop Social Engineers Exploiting The Global IT Outage

The recent global IT outage on Windows hosts will likely lead to a surge of threat actors posing as support agents offering “help” as a part of a social engineering attack. Here are some quick tips from Arctic Wolf to help you spot and stop these attacks.