Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Friday Flows Episode 11: Respond to & configure Terraform Cloud run task

The question of the week from a customer was: “How do we use Tines with our Infrastructure-as-Code methodology?” Today we’re looking at how to automate processes around Terraform Cloud, like documentation, opening tickets, and getting approval for changes in the cost of the infrastructure. Use this workflow to save time, maintain consistent records for audits, and manage incremental infrastructure costs.

Detect malicious files with BinLib: a private binary library

We’ll look at one of LimaCharlie’s newest features: Binary Library, or “BinLib”, a private repository of binaries observed in an organization. BinLib opens up new opportunities for detecting malicious files within an organization. Historical searching and YARA scanning allow you to take your binary detection to the next level, as we will observe and discuss in this session.

Essential Eight Compliance: Key Metrics To Track

‍Cybersecurity has become crucial for businesses and government entities in today's ever-changing digital landscape. While various frameworks and guidelines are available, the Australian Signals Directorate's "Essential Eight" is an effective and practical approach to strengthening an organization’s security against cyber attacks and threat actors.

Vendor Offboarding: Best Practices for Ensuring Security

When organizations hear “third-party risk management,” they often consider the processes needed to mitigate risks when working with a third-party vendor. These can include procurement risks and risks associated with starting new vendor relationships, often referred to as "onboarding,”—but what about when a working relationship ends?

How Cloudflare mitigated yet another Okta compromise

On Wednesday, October 18, 2023, we discovered attacks on our system that we were able to trace back to Okta – threat actors were able to leverage an authentication token compromised at Okta to pivot into Cloudflare’s Okta instance. While this was a troubling security incident, our Security Incident Response Team’s (SIRT) real-time detection and prompt response enabled containment and minimized the impact to Cloudflare systems and data.

The State of Cyber Defense 2023: Detection and Response Maturity Model

The Kroll Detection and Response Maturity Model analyses 1,000+ security programs from organisations around the world to identify their actual maturity, the ROI of mature programs and what security leaders can do to elevate their detection and response capabilities. The report leverages data uncovered in our The State of Cyber Defense 2023: The False-Positive of Trust, which looked at responses from 1,000 global security decision-makers.

AIDS Alabama Announces Breach, Patient Information Accessed by Cyberattack

AIDS Alabama Incorporated (AAI) serves over 8,000 Alabama residents, assisting them with emotional and medical support where possible. They are a clinic of humanitarian advocates, helping community members with housing and food; AAI is also an outspoken supporter of Black Lives Matter, substance abuse help, and preventative education. Your data may be at risk if you’ve received services or assistance from AAI.