Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's going on? The power of normalization in Cloud SIEM

Many of us in the information security sphere have sat in front of a console and furiously executed various queries while either mumbling internally or externally, with varying levels of stress and frustration: what is going on? When investigating a particular system, an odd event, or a declared incident, we are all attempting to answer this question in one way or another. Detections, documented threat hunts and security operations procedures do not manifest out of thin air.

Revolutionizing Security: Brivo's Unified Platform for Enhanced Collaboration

Dive into the world of advanced security with Brivo's groundbreaking collaborative framework. In this video, we explore how Brivo is changing the game by fostering open collaboration among providers to create an integrated security environment. Discover how this approach allows customers to control and respond to events from a single platform, making security management more efficient and effective than ever before.

Gap Analysis - Leverage what you do now to set yourself up for success in the future as well.

How TrustCloud leverages the work you do now and sets you up for success in the future as well. Gap analysis is designed to give you insight into other compliance standards and your gaps with them. If you are looking to pursue other standards, this tool is great for determining the level of effort required from your team.

ChatGPT: A Tool for Attackers and Defenders

ChatGPT impresses everyone with its writing capabilities; however, its proficiency in understanding and generating human-like text has inadvertently empowered threat actors to produce realistic and error-free phishing emails, which can be challenging to detect. The use of ChatGPT in cyberattacks poses a significant threat, particularly for attackers whose first language isn’t English. This tool helps them overcome language barriers, enabling the creation of more convincing phishing content.

Beyond Tech: Shaping Cybersecurity Through Strategic Influence

Robert Black discusses the misconception of cybersecurity as purely a technical issue. He highlights the importance of shaping opinions and strategies, reflecting on the National Cyber Force's cognitive effect strategy. Discover why cybersecurity requires more than just technical expertise.

The [Beatings] Ransoms Will Continue Until [Morale] Culture Improves

As we near the halfway point of 2024, it is apparent that the epidemic of extortionary cyber attacks will continue unabated into the foreseeable future. Now more than ever, I believe that until organizations adopt cultural approaches to cybersecurity, breaches will continue to wreak havoc on companies and industries.

AI in Tines | Product Spotlight

Stephen O’Brien, Head of Product, will walk through our journey to introducing AI in Tines. He’ll cover key questions you asked us, and the ones we asked ourselves as we tested and iterated with this innovative technology. Journey with AI from research to practical implementation Best practices with interacting in Tines Next steps for AI in Tines We’re extremely excited about the usability improvements we built and how they’ll reduce friction for both our advanced and novice users alike.