Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SecOps

What Are Control Flow Statements?

Control flows are the backbone of automation. Identifying what to do with a set of data – and how – is a key component of high-value automation, but it can also be confusing to wrap your head around at first. What is a conditional? And what does it have to do with a loop? How do you deal with a set of information versus a single data point?

Top 5 Takeaways from RSAC 2022

It’s been just over a month since cybersecurity conferences returned in a big way with the comeback of RSA Conference after last year’s hiatus. A lot happened between 2020 and 2022 in the world, our lives, and cybersecurity, including the birth of a little no-code security automation start-up named Torq. RSAC 2022 was a great place to catch up on these changes and look forward to emerging trends and security needs.

3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About

The German IT Security Act 2.0 (IT-SiG 2.0) has been in force since May 2021. Due to this new law, significantly more German companies have been classified as operators of critical infrastructures (KRITIS) than ever. This is a major cause of headaches for many managers. In addition, IT departments are starting to ask themselves: "Are we now regarded as KRITIS"? And if so, "What do we have to take into consideration?"

7 Things You Should Know About Verizon DBIR 2022 and How Arctic Wolf Can Help

The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides an analysis of information security incidents, with a specific focus on data breaches. Verizon has been publishing this report on an annual basis since 2008.

The AWS Shared Responsibility Model Guide

Organizations are moving workloads to the cloud to help keep pace with the speed of innovation. However, too often this is done without a proper plan in place to ensure that their security doesn’t fall behind. The potential financial and reputational damage, as well as the risk of lost data from a breach is massive, and that makes proper planning crucial.
Sponsored Post

Automated Security Alert Remediation: A Closer Look

In cloud-native organizations and software as a service (SaaS) businesses, cloud security automation is becoming a must-have feature. You can't stay ahead of threats across several levels of your cloud environment using manual procedures alone, and you can't rely exclusively on cloud providers' security technology, which doesn't operate across different clouds and lacks advanced automation features. Managing these infrastructures and apps in multi-cloud settings becomes increasingly difficult and compounds the operational issues that you face today. Automation is the way to go if you want to stay ahead of the game and meet the expectations of your customers.

The Top Cyber Attacks of June 2022

Temperatures rose in June, and the threat of serious cyber attacks soared along with them. The start of summer saw revelations of major breaches in confidential medical information, a case study for changing-up hacked passwords, another round of victimization for people whose data has already been sold once before, and one high-profile threat to undermine an entire democracy. Let’s take a closer look at these troubling instances, plus one controversial effort to rein in the crimewave.

How can SOC analysts use the cyber kill chain?

Security Operation Centers (SOCs) offer a robust method of ensuring cybersecurity and safety within an organization. Their demand has continued to grow, specifically with a significant rise in cyber-attacks amidst a looming cybersecurity skills gap. However, despite a typical SOC analyst's immense training and knowledge, mitigating the increase in cyber-attacks is no easy job.

Cyber Insurance Sticker Shock: Now What?

Cyber insurance has become increasingly expensive for most policyholders. Various organizations, including industry heavyweights such as Aon who have predicted premium hikes between 20% and 50% this year. There are even reports of premium increases as high as 1,000% for organizations with the highest risk. Unfortunately, many of these premium increases occur with little warning, often within a few weeks of a policy renewal.

CVE-2022-28219: Trivial PoC Exploit Could Lead to Unauthenticated RCE in ManageEngine ADAudit Plus

On Wednesday, June 29, 2022, Horizon3.ai published a proof-of-concept (PoC) exploit that targets CVE-2022-28219, a critical attack chain that includes unauthenticated XML External Entities (XXE), Java deserialization, and path traversal vulnerabilities that could lead to remote code execution (RCE) if successfully chained together. CVE-2022-28219 impacts Zoho’s ManageEngine ADAudit Plus builds prior to 7060. ManageEngine patched CVE-2022-28219 on March 30, 2022.