Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Spot a Next-Gen SIEM Imposter

Staying ahead of the cybersecurity curve can feel like running a marathon uphill, and the right SIEM is key to leveling the playing field. Smarter SIEM solutions have emerged from the cloud to address the changing demands of today’s security operations. Unlike legacy SIEMs, which were designed for on-premises deployments and have limited scalability, more innovative next-gen solutions offer cloud-native SaaS models that provide greater flexibility and scalability.

How the MITRE ATT&CK Framework Helps CISOs Communicate Risk to Stakeholders

Picture this: Your CEO comes into your office and asks, “What’s our security posture, and where’s our greatest area of risk? I’m particularly worried about this new emerging threat group. What defenses or detections do we have around that?” You: “…” Enter the MITRE ATT&CK® framework and Devo’s MITRE ATT&CK Adviser app—built to help you tell the business where your risks are and what it would take to address them.

Does Your SIEM Empower Your SOC?

The right SIEM can make or break your SOC. While there are a lot of security solutions and platforms for you to choose from, ask yourself–how will they make life in your SOC better than before? If you make the right choice, you’ll empower your SOC to work more efficiently, more effectively, and more proactively. As you do your research and consider which SIEM is right for you, make sure it checks these boxes. Your analysts will thank you.

Falcon Cloud Security Kubernetes Admission Controller: Demo Drill Down

Misconfigured containers with root access are commonly deployed in cloud environments, leaving organizations vulnerable to adversaries. See how Falcon Cloud Security Kubernetes Admission Controller provides out of the box policies to prevent misconfigured containers from deploying, ensuring cloud environments are secured and compliant.

Falcon Exposure Management Active Asset Scanning: Demo Drill Down

Organizations often grapple with hidden network vulnerabilities akin to navigating an unseen, complex labyrinth. Falcon Exposure Management alleviates this challenge, transforming obscured vulnerabilities into visible, managed, and secured assets through its Active Asset Discovery feature. It employs customizable, non-intrusive scans, ensuring that every asset is mapped without disrupting operations. In this demo, experience the revelation of every network corner, unveiling a fortified defense ready to counter cyber attacks.

The Role of AI in Your Governance, Risk and Compliance Program

In today’s rapidly evolving business landscape, organizations face an ever-increasing array of risks and compliance challenges. As businesses strive to adapt to the digital age, it has become imperative to enhance their Governance, Risk Management, and compliance (GRC) strategies. Fortunately, the fusion of artificial intelligence (AI) and GRC practices presents a transformative opportunity.

Piecing Together the Attack on Okta's Support Unit

The October 2023 Okta breach is the latest example in a long line of third-party identity attacks. Based on reports to date, it seems that the attack on Okta’s support case management system enabled a threat actor to launch downstream attacks into other companies. So far, 1Password, BeyondTrust and Cloudflare have publicly confirmed they were targeted. Such attacks don’t discriminate and pointing fingers is unproductive.

OAuth security gaps at Grammarly (now remediated)

This short video explains how Salt Labs researchers identified several critical security flaws on the popular site - Grammarly. The flaws were found in the site's authentication functionality and could have allowed a malicious attacker to take over user accounts, access profile information, and take actions on behalf of the user. All issues were reported to Grammarly and have been resolved with no evidence of these flaws being actively exploited in the wild. In the research, they also found similar vulnerabilities in Vidio.com and Bukalapak.com.