Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Social Engineering Took Down MGM and Caesars

Two major players in hospitality and gaming, MGM and Caesars, were victims of two, separate cyber attacks. While the details are still unknown, what is known is that Caesars paid the hackers a multi-million dollar ransom, and that both attacks began with social engineering.

8 Steps to Achieve Cybersecurity Compliance

Cybersecurity compliance is complicated. As the cybersecurity industry changes, so do compliance requirements and, depending on your organization’s operations, compliance could mean adhering to multiple frameworks and reporting to multiple governing bodies. In fact, 67% of organizations surveyed by Arctic Wolf follow between one to three sets of guidelines.

Arctic Wolf Offers Canadian Rural Healthcare Network Holistic Security Support

As a rural healthcare network located north of Toronto, Ontario, the employees of Grey Bruce Health Services understand that PHI fetches a high value on the dark web, and that they could be one ransomware attack away from stolen data, or worse, encrypted networks that prevent critical patient care. With Arctic Wolf, including Arctic Wolf Managed Detection and Response and Arctic Wolf Managed Risk, IT Director Liane Coates feels confident and comforted that there’s a protective defensive layer not only monitoring the environment 24x7 but working on vulnerability management and proactive security strategies.

The SecOps Cloud Platform Ecosystem

A hosted panel discussion with industry leaders to explore what advantages the SecOps Cloud Platform confers for ecosystem builders. The panel is moderated by LimaCharlie's Head of Product, Matt Bromiley. The panel participants are: Senior Security Researcher at Thinkst, Casey Smith Security Evangelist at RunZero, Huxley Barbee Head of Tines Labs, John Tuckner.

Redefining Cybersecurity Operations: The Power of Torq's Workflow-Centric Case Management

Cybersecurity is a landscape forever in motion, an arena where threats evolve at an alarming pace. The tools we employ to counter threats should match this pace and anticipate the unforeseeable. Still, a chasm exists where tools are not keeping up with the changes, particularly regarding case management. I’m Dor Morgenstern, lead PM for Case Management at Torq. With a background rooted in cybersecurity, I’ve seen firsthand the evolving challenges that security operations face.

How Security Operations Reduces the Risk of a Cyber Incident by Over 90%

The value of cybersecurity solutions is uniquely difficult to quantify. As with any risk-reduction investment, the ideal outcome is we simply avoid the outcome we’re defending against. But then how can we understand the value of our security strategy? Even if we can identify attempted compromises that are thwarted, it’s still challenging to scope out the potential impacts we were able to avert.

Arctic Wolf Managed Security Awareness: The Mission

Arctic Wolf Managed Security Awareness® prepares your employees to recognize and neutralize social engineering attacks and human error—helping to end cyber risk at your organization. Fresh. Original. Effective. That is the content you can expect to see through Arctic Wolf Managed Security Awareness®.

Arctic Wolf Cybersecurity Awareness Month: House of 1000 Breaches Trailer

This October, Arctic Wolf Managed Security Awareness in conjunction with Cybersecurity Awareness Month presents “House of 1000 Breaches”, the cybersecurity anthology raising goosebumps and social engineering awareness of all who dare to watch. Available to Arctic Wolf Managed Security Awareness subscribers, and on the Arctic Wolf YouTube Channel. Learn more about Security Awareness and how it can prepare your employees to recognize and neutralize social engineering attacks and human error.

Modernize your Security Operations with Elastic Security

Cybersecurity is evolving. Protection needs to be dynamic. Investigation… faster. An effective response requires accurate context. Modernizing your security operations with Elastic extends security visibility, uncovers potential threats, and integrates with existing security systems — for a swift and proactive response. Everything you need on one open and unified platform, built for the hybrid cloud. Elastic Security empowers your business to achieve more even in the most complex digital environments.

The SecOps Cloud Platform for Product Builders

A hosted panel discussion with industry leaders to explore the advantages of the SecOps Cloud Platform for product builders. The panel is moderated by LimaCharlie's Head of Product, Ross Haleliuk. The panel participants are: Founder & CTO of Recon InfoSec, Eric Capuano Lead Incident Detection Engineer at Blumira, Amanda Berlin What is the SecOps Cloud Platform?