Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Clean Up Your Active Directory

Despite the popularity of the cloud, Microsoft Active Directory (AD) remains a crucial component of the IT infrastructure for many organizations. Indeed, Active Directory often serves as the central identity repository and provides vital authentication and authorization services — so keeping it clean and well organized is vital. Discover exactly why regular AD cleanup is critical — and the key signs of a poorly maintained AD environment.

Keeping Data and Systems Secure With Privileged Access Management

Research shows that most of today’s cyberattacks occur when a cybercriminal gains access to a system through stolen credentials. Users with extra privileges, particularly IT administrators, are often targeted by threat actors who steal those privileges to access sensitive information and take control of systems. With an increase in virtual and hybrid work, across both the public and private sectors, these kinds of attacks are only becoming more common.

Using Co-Managed SOC to Derive Maximum Value from a SIEM Investment

Security information and event management (SIEM) systems are crucial to cyber security, providing a solution for collecting and analyzing alerts from all manner of security tools, network infrastructure, and applications. But simply having a SIEM is not enough because to be truly effective, it must be properly configured, managed, and monitored 24x7.

CommScope Hit By a Ransomware Attack Putting Employees at Risk

CommScope is a massive tech company with more than 30,000 employees. The organization works with companies around the world and helps to establish network infrastructure systems for hospitals, schools, federal agencies, and more. CommScope is based out of Hickory, North Carolina, and has been in business since 1976. The massive company has an annual revenue of 9.23 billion USD and manages substantial networks for businesses throughout the United States.

Weekly Cybersecurity Recap May 5

Data breaches are harmful to the companies they hit as well as their customers, and this week telecommunications and networking companies were hit especially hard. T-Mobile and AT&T both suffered from serious breaches that put their customers at risk of being exposed. Networking giant CommScope was the victim of a vicious ransomware attack, putting network infrastructure technology at risk. Grocery chain Albertson's and dating sites were also exposed this week.

ChatGPT Data Breach Break Down

OpenAi have confirmed they have had a data breach involving a vulnerability inside a open-source dependency Redis. This allowed threat actors to see history from other active users. But this leads to the bigger question, how can we secure ChatGPT. In this video I explain my position using some interesting data that ChatGPT should be part of all organizations threat landscape and that banning ChatGPT won't help the situation.

Webinar: Six Best Practices to Help with Your Regulatory Compliance Program

Companies around the world today need to deal with a wide array of standards and regulations, many of which are specific to their industry vertical or region. But MSPs work with customers in many different verticals and need broad awareness across different industries. This webinar will highlight how there are common threads that will help with compliance with any regulation.

Webinar: How XDR Can Help MSPs Scale and Grow Their Businesses

Cyberattacks are becoming ever more sophisticated, leaving MSPs struggling to stay ahead of the game with their limited tools and fragmented views. Join us in this webinar as we explore XDR – a modern approach that helps strengthen cybersecurity capabilities and offers comprehensive protection for customers. Join us in this webinar, where we'll give you XDR essential concepts and the keys to free up overwhelmed security teams trying to triage and identify attacks with only narrow, disjointed attack viewpoints. We’ll be covering the following.

How to spot a deep fake? #shorts

Andy Thompson, Offensive Security Research Evangelist at CyberArk Labs, returns to Trust Issues for a dive with host David Puner into the latest developments in the world of ransomware. With ransomware events on the rise, Thompson sheds light on the alarming trend of data exfiltration and double extortion. But what’s causing this surge?