Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Harness Data to Prevent Fraud with Splunk and AWSSPLUNK_AWS_FRAUD_11202024 (1)

In this webinar, you will learn about the influence of data-driven technology on fraud detection and prevention. You will discover how businesses can use AI, machine learning, and big data analytics to proactively identify hazards and monitor transactions in real time. The workshop will provide useful insights into cutting-edge solutions that improve customer security and protect sensitive information, as well as practical tactics and case studies for successfully combating fraud.

How To Combat Cyber Threats in the Finance Industry With a PAM Solution

According to IBM’s Cost of a Data Breach Report 2024, the average cost of a single data breach reached an all-time high of $4.88 million last year, driven by increased revenue loss, operational downtime, customer churn and regulatory fines, among other factors. As frequent targets of cybercriminals, finance services companies face especially high risks – and the consequences of a successful breach can be particularly damaging from both reputational and compliance perspectives.

How to Achieve Modern Security and Network Performance with Netskope [Overview]

The face of network security has changed forever. With the rise of cloud computing and SaaS applications, traditional solutions are no longer sufficient. In this video, the minds behind Netskope discuss how the company is innovating to provide better protection, with a focus on granular policy enforcement, context-aware security, and scalable solutions.

Security Bulletin: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion

On March 4, 2025, Broadcom, which acquired VMware in 2023, released security updates to fix three actively exploited vulnerabilities in VMware ESXi, Workstation, and Fusion that could result in code execution and information disclosure. CVE-2025-22224 is a critical TOCTOU (Time-of-Check Time-of-Use) race condition vulnerability that leads to an out-of-bounds write, allowing an attacker with administrative privileges on a virtual machine to execute code as the VMX process on the host.

Byte Back: Next-Generation Malware Classification Using Binary Transformers

In recent years, Transformer models have been the backbone of the revolution within the artificial intelligence sector. They are the basis of large language models (LLMs) and responsible for LLMs’ ability to understand and generate text of a human-like quality. Transformers are able to learn long-range interactions between words and sentences, allowing them to retain high-level concepts and insights into their training data.

What is PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a global security framework established by major credit card brands that outlines security requirements for any organization handling cardholder data, including encryption, access control, and network security. PCI DSS is regularly updated, and Version 4.0, effective March 2025, focuses on allowing organizations to tailor security controls to their specific needs.

Egnyte on Azure Marketplace: A Powerful Partnership

With collaboration and efficiency a top priority, Egnyte’s partnership with Microsoft is revolutionizing the way teams work together. Many organizations are already leveraging Microsoft Office products, and now it’s easier than ever for them to streamline their procurement process and get the most out of their technology investments. Starting today, Egnyte is available through the Microsoft Azure Marketplace!

[PCI DSS Requirement 11] : Summary of Changes from Version 3.2.1 to 4.0 Explained

Did You Know? PCI DSS Requirement 11 mandates regular vulnerability scanning and penetration testing to identify and address security weaknesses in your cardholder data environment (CDE). Organizations that fail to conduct regular vulnerability scans are significantly more likely to experience a data breach. Properly scoped penetration testing can reveal critical vulnerabilities that automated scans might miss, ensuring robust protection of cardholder data.

Tanium gives certainty to U.K. institutions of higher learning

Hear from IT leaders from some of the United Kingdom's top universities on the challenges they face and how they support their institution's mission of higher learning with help from Tanium. Featured interviews: Dennis Knight, End User Computing Manager, Canterbury Christ Church University Alex Goffe, Director of Campus Technology Services, University of Manchester Karan Singh, Head of Cybersecurity, University of Arts London Chris Howarth, Technical Information Security Manager, University of Salford PJ Hemmaway, CIO, University of Manchester.