Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Alerts to Action: How AI Empowers SOC Analysts to Make Better Decisions

Security Operations Center (SOC) analysts have it rough. Modern security tools generate an extraordinary number of alerts, attackers are more sophisticated than ever, and IT infrastructures are unprecedentedly complex. As a result, analysts are overwhelmed with workload and alerts, making it near-impossible to make intelligent, informed decisions. Fortunately, artificial intelligence (AI) is helping to ease the strain. Let’s look at how.

CIS Control 05: Account Management

Knowing who has credentials, how those credentials are granted, and how they are being used is the foundation of any secure environment. It begins with user accounts and the credentials they use. Maintaining a thorough inventory of all accounts and verifying any changes to those accounts as authorized and intentional vs unintended is paramount to establishing a secure environment, and this includes service accounts.

Understanding Microsoft's CVSS v3.1 Ratings and Severity Scores

Recently, I looked at Microsoft’s assigned CVSS v3.1 scores for Patch Tuesday vulnerabilities alongside the Microsoft assigned severity ratings. I wanted to revisit these numbers and see just how closely CVSS aligns with Microsoft’s opinion of severity. Disclaimer: I’m aware that CVSS v4.0 exists. However, Microsoft has not yet adopted it, and I wanted an apples-to-apples comparison.

A Developer's Guide to Running an SCA Scan

Your IT infrastructure is a complicated network of systems and activities that generate massive volumes of data every second. Hidden within this data stream is the key to understanding your systems’ health and potential dangers. The dangers are significant, given that the average worldwide data breach costs an exorbitant $4.45 million. One such security breach can destroy your organization, resulting in legal fines, financial loss, and harm to your reputation.

How Protecto Safeguards Sensitive Data in AI Applications

Discover how to build secure, compliant, and privacy-preserving AI applications with Protecto. In this video, we explain how Protecto's simple APIs protect sensitive data, ensuring compliance with regulations like HIPAA. Learn how a healthcare company used Protecto to create an AI-based fraud detection application while safeguarding millions of patient health insurance claims. Protecto's API masks sensitive information, preserving context and meaning without exposing personal identifiers like names or social security numbers.

Cybersecurity 2025 - Predictions from the Experts

Surviving and Thriving in the 2025 Cybersecurity Landscape: Predictions and Strategies Welcome back to Razorwire! Join me, Jim, as we forecast the major trends and changes for 2025 that are set to reshape the cybersecurity industry. Joining me are cyber veterans and regular guests Oliver Rochford and Richard Cassidy.

Password Policy Compliance Overview: NIST 800-63, HIPAA, PCI DSS, and the GDPR

In the digital age, where cyber threats loom large and data breaches have become all too common, the humble password remains a vital security gatekeeper. Yet, with stolen credentials accounting for 31% of breaches, according to Verizon’s 2024 Data Breach Investigations Report, it’s clear that organizations often fail to protect passwords.

Elevating Endpoint Security: Lookout Mobile Intelligence APIs

There’s no denying that mobile devices have become essential tools for employees — they facilitate communication and boost productivity by providing access to corporate resources from virtually anywhere. But that convenience comes at a cost. The role of the mobile device, in terms of how much can be done with them and the amount of data they can give users access to in a convenient and familiar form factor, has made them indispensable to the modern workforce.

Instant Insights for SOC 2 Reporting: Using AI to Streamline Vendor Assessments

With technology supply chain risks at an all-time high, many governance, risk, and compliance (GRC) teams conduct formal risk assessments as part of their new vendor selection and onboarding processes. Audit-based reporting frameworks like SOC 2 are invaluable to these efforts, as they provide a consistent way to benchmark prospective vendors’ customer data management practices.