Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LastPass Breach Demonstrates the Power of Avoidance

A recent LastPass breach has once again raised concerns about password managers’ security, especially commercial password managers with cloud infrastructure. The breach led to hackers gaining access to both code and data. This time on Dark Reading, I describe how I became a proponent of secret managers and LastPass, my chosen password manager, and how I helped my family and colleagues to do the same.

Five Things to Know About the NIST CSF 2.0

The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) is undergoing a major update. Originally released in 2014, the NIST CSF is one of the most widely used cybersecurity frameworks helping organizations understand and manage their cybersecurity risk. NIST is currently updating the CSF to align with the latest cybersecurity trends and best practices, with the expected release date of the CSF 2.0 slated for the first quarter of 2024.

A Checklist for Outsourcing Your SOC

Cybercrime is on the rise. This trillion-dollar industry is only gaining momentum with ransomware and business email compromise attacks, and recent trends show that the odds of becoming a breach victim are about 50%. Not to mention that the skills shortage gap continues to plague organizations, with many stating they would need five or more employees to fill it.

Using the Azure PKI Solution for IoT Security

Public Key Infrastructure (PKI) is a set of policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The purpose of PKI is to facilitate secure electronic communications by authenticating users and devices. Organizations that use PKI can be assured that their messages are confidential and tamper-proof because each message is encrypted with a unique key that only the intended recipient can decrypt.

OneLogin and AWS CloudTrail Lake Integration

As an AWS Partner, One Identity is proud to announce that it is now even easier to leverage your existing AWS tooling with your OneLogin data. We are among the first partners to offer a new integration that joins tools, such as our previously released AWS EventBridge webhook. Now, AWS and One Identity have teamed to deliver an integration with AWS CloudTrail Lake, which allows you to store your OneLogin event data in AWS along with all your other data.

Introducing SSH command controls and advanced PEDM capabilities for Linux in PAM360

PAM360 is ManageEngine’s comprehensive privileged access management (PAM) solution designed for enterprises to protect sensitive, privileged identities from internal and external threats. With the principle of least privilege enshrined across the product, PAM360’s privilege elevation and delegation management (PEDM) capabilities help enterprises eliminate standing privileges and provide granular privileged access in a restricted, time-based manner.

Building blocks for Cyber resilience: MSSPs can lead the way

In today's world, cybersecurity is an ever-growing concern for businesses. With the rising threat of cyber threats and data breaches, it can be difficult for companies to keep up with the latest security technologies and stay ahead of the curve. Managed Security Services Providers (MSSPs) provide comprehensive security solutions to clients. They offer various services, from monitoring and threat intelligence to incident response.

Modern SOC and MDR Series III: The Different Roles within a Modern SOC

Modern SOCs are highly specialized security operations centers whose objective is to detect attackers who have gained access to an organization's device or network. Built around complex environments, a team of cybersecurity experts who have been assigned different roles coordinate operations at SOCs.

Unlocking the power of AI and Natural Learning

In Calligo’s latest Beyond Data podcast, co-hosts Sophie Chase Borthwick and Tessa Jones are joined by Alexander Visheratin, Artificial Intelligence Engineer at Beehive AI. Here we explore some of the episode’s highlights; the importance of Natural Learning Processing (NLP) and the pros and cons of output produced by examples like OpenAI’s ChatGPT-3.