Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Coffee Talk with SURGe: 2023-APR-25 The Interview Series live from RSA Conference

Grab a cup of coffee and join Mick Baccio and special guests Juan Andres Guerrero-Saade and Jon DiMaggio for another episode of Coffee Talk with SURGe, live from RSA Conference in San Francisco. Guerrero-Saade and DiMaggio are both contributing authors for Bluenomicon, a new book by SURGe that features stories and advice from security leaders and practitioners. You don't want to miss it!

SecOps In Seconds: Creating Response Templates in Splunk Mission Control

Streamline your workflows by improving SOC process adherence when you codify your operating procedures into pre-defined templates. Use Splunk Mission Control to speed up investigations with pre-built response templates that include embedded searches, actions, and playbooks to empower security analysts. Model your response plans based on pre-built templates that can be used for security use cases such as “Encoded PowerShell Response”, “Insider Threat” or “Ransomware”. Or build your own templates based on your established processes that are scattered across systems to finally achieve repeatable security operations. This allows you to close the gap between your Splunk ES detections and rapid incident response.

Rubrik & Zscaler Announce Industry's First Double Extortion Ransomware Solution

While ransomware continues to be a growing problem, double extortion ransomware in particular has been growing even more rapidly for organizations. Zscaler’s ThreatLabz has found a nearly 120% growth in double extortion ransomware. Double extortion attacks are devastating for organizations because they involve both the encryption of production data as well as the exfiltration of data.

User Management via the Get-ADUser Cmdlet in PowerShell

The Get-ADUser cmdlet in PowerShell provides many parameters for finding one or more users in an Active Directory (AD) domain. By default, PowerShell runs using the account that is logged on to the machine. If you want to run a command using a different account, you can force PowerShell to prompt you for the credentials by using this switch before your command.

Cyber security and Critical Infrastructure: Are We Prepared for the Worst?

In this episode of Razorwire, I had the pleasure of speaking with Phil Tonkin from Dragos about securing critical infrastructure. Phil and I delved into the definition of critical infrastructure, the fragility of supply chains and the importance of preparing for potential attacks. We also talked about the Colonial Pipeline incident and the inextricable link between IT and OT in critical infrastructure.

EP 26 - Ransomware Revisited: Combating the Identity Explosion

Andy Thompson, Offensive Security Research Evangelist at CyberArk Labs, returns to Trust Issues for a dive with host David Puner into the latest developments in the world of ransomware. With ransomware events on the rise, Thompson sheds light on the alarming trend of data exfiltration and double extortion. But what’s causing this surge? Thompson connects the dots between the rise of digital identities and the increasing frequency of ransomware attacks.

Why Certifications Matter: Experience, Assurance, Mastery and Competence

Certification to International Standards is an essential component of the modern business world. Certification to these standards provides organisations with external validation of their policies, processes and controls but also corroborates their knowledge and skills in key areas.

What is DLP and How Does It Work

Data loss prevention, or DLP for short, is a technology that helps companies protect their data from unauthorized access or theft. It does this by scanning all incoming and outgoing data for sensitive information and then preventing that data from leaving the company's network. In this blog post, we will discuss what DLP is and how it works!

Evolving cyberattack landscape: What to expect in the future

In today’s increasingly digitized world, cybersecurity has become an essential concern for individuals and businesses alike. With more and more data being transmitted and stored online, the risk of cyberattacks and data breaches has never been higher. The field of cybersecurity is rapidly growing and evolving, with new technologies emerging all the time.

Improving your bottom line with cybersecurity top of mind

In times of economic downturn, companies may become reactive in their approach to cybersecurity management, prioritizing staying afloat over investing in proactive cybersecurity measures. However, it's essential to recognize that cybersecurity is a valuable investment in your company's security and stability. Taking necessary precautions against cybercrime can help prevent massive losses and protect your business's future.