Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elastic and AWS deliver on AI-driven security analytics

Amazon Bedrock and Elastic’s Attack Discovery automate security analyst workflows As cyber threats grow increasingly sophisticated, the need for highly effective security measures becomes imperative. Traditional SIEMs aren’t equipped to address threats fast enough because they rely on too many manual and labor-intensive tasks. AI-driven security analytics from Elastic’s Search AI platform solves these challenges.

Succeeding at Cloud Vulnerability Management

Many organizations are migrating to cloud infrastructures. The cloud presents new levels of flexibility and scalability in the way organizations operate. But as with any new opportunity, it also creates new forms of risk. How can organizations succeed at identifying and remediating these security risks?

Identity and Access Management Assessment: Key Features

Choosing the right identity and access management (IAM) solution is an important task. Organizations need to properly manage user accounts and other identities and ensure they have exactly the appropriate access to data, applications and other resources. After all, if users do not have all the rights they need, they cannot do their jobs and business processes suffer.

Leading the Charge in Intelligence Powered Cybersecurity

In the fast-paced world of cybersecurity, staying ahead of threats is not just a goal—it’s a necessity. We have once again proved this to be true by clinching the prestigious, first-ever Next Gen Intelligence Powered Security award from Cyber Defense Magazine (CDM) at the RSA Conference 2024 in San Francisco. This first-of-its kind award, marks a pioneering step into this new frontier of cybersecurity.

A Guide to Enhancing Election Security Using Effective TPRM

Election security is one of the most important parts of an election in order to preserve voter safety, prevent voter fraud, and, ultimately, build public trust in the electoral process. Because of the many external pieces that must come together during the election process, election organizers must use and implement effective Third-Party Risk Management (TPRM) as part of their security strategy.

Trustwave Takes Home Global Infosec Award for 2024 Best Solution Managed Detection and Response (MDR) Service Provider

For the second consecutive year, Cyber Defense Magazine honored Trustwave with a 2024 Global InfoSec Award for Best Solution Managed Detection and Response (MDR) Service Provider.

How To Prevent Password Fatigue

Password fatigue is the exhausting feeling individuals experience due to the excessive number of passwords they need to memorize. People need to remember their passwords to access applications and networks that hold their sensitive information. However, constantly resetting and remembering passwords can burden them, resorting to insecure practices such as saving passwords in a spreadsheet.

Guardians of the Gateway: Identity and Access Management Best Practices

This is Part 10 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. Identity protection is one of the most important topics in cybersecurity. It is often complex in its configuration and operation. Over 80 percent of all security incidents result from poor identity access controls. Consider the following recommendations when developing a comprehensive Identity Management strategy.

Introducing LevelBlue: Elevating Business Confidence By Simplifying Security

Today is a monumental day for the cybersecurity industry. Live from RSA Conference 2024, I’m excited to introduce LevelBlue – a joint venture with AT&T and WillJam Ventures, to form a new, standalone managed security services business. You can read more about the news here. In 2022, I founded my private equity firm, WillJam Ventures, and since then, we’ve held an exceptional track record of investing in and operating world-class cybersecurity businesses.