Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Optimize and Automate

SecurityScorecard Co-Founder and Chief Operating Officer Sam Kassoumeh shares Tip #1 from our ebook, 5 Ways to Secure Your Organization in Turbulent Times: Optimize and automate your business ecosystem risk management (aka your third-party risk management) program - to save time and reduce risk.Your security posture is never just your security posture. In this hyperconnected cloud ecosystem, it’s a combination of your own, your vendors’, their vendors’, and so on. Learn how the cyber health of your ecosystem can grow trust and integrity with your clientbase, and also maintain business continuity.

Discord - Fundamentals and Threats

In a world where more and more communities and businesses are based on instant messaging applications, it is just a matter of time before instant messaging takes the spotlight away from the traditional social media and commerce platforms. Instant messaging applications are more convenient than conventional forums and social media groups. However, the instant messaging realm is also divided into different application types and purposes.

Cybersecurity Offboarding: How to Protect Passwords When Employees Leave

Ending a business relationship with an employee can be daunting, especially if things end on bad terms. Offboarding is critical to ensure that any disgruntled former employees do not expose company information. There have been cases in the past where former employees are the cause of massive data breaches. Some data breaches are intentional, like when a former CIA employee was convicted for carrying out the largest data leak in the agency’s history.

Insight Into The Strengthening America Cybersecurity Act

Signed into law in March of 2022, the Strengthening American Cybersecurity Act (SACA) gives federal authorities an overview of all cyber attacks against critical infrastructure in the United States for the very first time. SACA has three parts: SACA comes at a time when governments are facing a significant paradigm shift.

Understanding Cyber Threat Intelligence

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” – Sun Tzu. The above quote by Sun Tzu summarizes cyber threat intelligence (CTI) perfectly.

Introducing Keeper MSP Upgraded Billing Platform

Keeper has updated our MSP platform and licensing to be much more flexible. This allows managed service providers and their managed companies to allocate Keeper licenses to their users and pay for those licenses at the end of the month. While other MSP solutions in the market bill upfront before licenses are allocated to users, Keeper’s new billing model is designed to scale with your MSP business as you add individual managed companies and users.

JUMPSEC

JUMPSEC’s mission is to change the way the organisations deal with security and enable organisations to use the security they have invested in to the fullest. Incrementally improving organisations cyber security protection year on year.

Automating insider threat monitoring

From ingestion of relevant data sources to automation around threat monitoring, the security engineering team at Netskope utilizes Sumo Logic as a key tool in the protection of their intellectual property. Join this session to learn how something that began as an idea for an easy-to-use dashboards developed into a near completely automated process for data collection and correlation for investigating suspicious activity.

Trustwave Recognized in Gartner 2022 Market Guide for Managed SIEM Services

Trustwave, a leading provider of Managed Security Services, has been named a Representative Vendor in the Gartner® 2022 Market Guide for Managed SIEM Services. In the report, Gartner analysts Al Price, John Collins, Andrew Davies, Mitchell Schneider, and Angel Berrios provide an updated definition of Managed SIEM Services along with how Managed SIEM, which is also known as a managed SoC or SoC as a service.

Overheard at the SANS Security Awareness Summit 2022

People have become the primary attack vector for cyber attackers around the world. As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals are concerned about are phishing, business email compromise (BEC) and ransomware, all closely related to human behavior.