Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Exfiltration: Prevention, Risks & Best Practices

Imagine a scenario where a competitor gains access to your organization's most sensitive data, causing severe financial loss and irreparable damage to your reputation. This nightmare can become a reality through data exfiltration. Data exfiltration is a real threat to organizations, as it involves the unauthorized transfer of sensitive information, the effects of which can lead to operational disruption, financial losses and damage to reputation.

Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter

At Splunk, you may hear us pontificating on our ponies about how awesome and easy it is to use Splunk to hunt for threats. Why, all you need to do is use X and Y with Splunk to find a Z score (no zombies were injured) and BOOM! That baddie in your network is detected. Going back to at least a decade, we’ve tried to make it easy — as you’ll see in the resources below — and yet threat hunting is about as easy as telling someone how easy it is to draw an owl.

Compound Extortion: UnSafeLeaks

Among the range of data leak sites monitored by JUMPSEC, our attention has been drawn to a recent variant called “UnSafeLeaks”, due to its distinctively malicious and personalised approach, setting it apart from typical leak sites that focus primarily on explicit financial extortion. Perhaps more remarkably, a number of targeted organisations also appear to have previously been compromised by closely affiliated groups, suggesting the potential re-extortion of victim organisations.

Types of Multi-Factor Authentication (MFA)

The four types of Multi-Factor Authentication (MFA) are knowledge, possession, inherence and location. These authentication types provide a foundation for a number of MFA methods, giving users multiple options for securing their data, ranging from SMS message tokens to hardware security keys. Which method is right for you or your business can depend upon what you have access to and how secure you want to be.

CloudCasa Is Making It Easy To Use Velero | Ryan Kaw At KubeCon+CloudNativeCon

Ryan Kaw, Vice President of Global Sales at CloudCasa by Catalogic, joined Swapnil Bhartiya, Founder and Editor-in-Chief of TFiR, at KubeCon + CloudNativeCon EU to deep dive into the availability of CloudCasa for Velero, which addresses problems around multi-cluster management, alerting and reporting, and provides enhanced recovery capabilities through a new user interface. CloudCasa recognizes that a lot of people are already using Velero in their environments, so the company decided to meet them where they are. The solution is compatible and complementary to Velero and the integration is non-disruptive.

Trust And Community Collaboration Drive Open Source Adoption In The Cloud

CloudCasa by Catalogic is a cloud-native backup service that protects Kubernetes and cloud-native data. In this episode of TFiR: T3M, Swapnil Bhartiya sits down with Sathya Sankaran, Chief Operating Officer at CloudCasa by Catalogic, to talk about the factors driving open-source adoption and the role CloudCasa by Catalogic is playing in the open-source ecosystem.

How do you choose an MSSP

Businesses in all industries face a constant barrage of threats and attacks. For government contractors (GovCons) handling sensitive information, ensuring robust security measures is paramount. A Managed Security Services Provider (MSSP) can be a valuable partner in safeguarding your organization’s critical assets. In this section, we will explore what an MSSP is, why GovCons need one, how to choose the right MSSP, and the essential questions to ask before hiring one.