Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 10.6: Show Smart Passkey Support

Is this really the 'death of passwords'? ��🔤 Steve Won, Chief Product Officer at 1Password, jumps into the deep end on today's show. Tune in, as we cover all things passwordless, passkeys, and how 1Password is leading the way to a passwordless future. We also lift the lid on all the latest security news in Watchtower Weekly, and reveal the iconic Random but Memorable game you voted to bring back in our listener poll! 🥁🗳️

Detecting and mitigating ransomware using Endpoint Central.

Is your organization at risk of a ransomware attack? Don't wait until it's too late. With Endpoint Central's advanced anti-ransomware solution, you can detect and block intrusions in real-time, using our multi-patented technology and AI-assisted detection engine. Keep your data safe and prevent costly ransom payments with Endpoint Central's 24/7 threat detection and rapid response capabilities.

Pentagon Data Leak Shows the Danger an Insider Threat Presents

U.S. officials confirmed last week that a member of the military photographed and uploaded more than 50 classified documents to a Discord server and other social media sites, again reminding us of the danger insider threats can present to any organization. According to the Associated Press, a member of the U.S. Air National Guard was arrested last week in Massachusetts in connection with the leak.

10 Managed Security Services Benefits for Businesses To Know

Every day the world discovers (and creates) new problems in the field of information security. Fresh bugs randomly pop out of nowhere, someone develops brand-new malware, and insiders continue to leak confidential information leading to the closure of the businesses - so how do companies cope with all the chaos? And what to do if there is no feasible way to create a security department within the organization? Is it worth it or wise to outsource such a critical life-saving function? Maybe.

Threat Hunting vs Incident Response for Cyber Resilience

Protecting data and protecting business continuity are both similar and different. In a data driven world, your mission as a security analyst is to prevent threat actors from gaining unauthorized access to sensitive data and systems. Simultaneously, you also need to investigate incidents rapidly, ensuring that critical services experience as little downtime as possible.

The State of Data Security: The Hard Truths of Data Security from Rubrik Zero Labs

Rubrik Zero Labs is excited to debut its second State of Data Security report: “The State of Data Security: The Hard Truths.” This in-depth global study is the first public use of Rubrik telemetry data to provide objective data security insights. Rubrik data is complemented by an extensive third-party study conducted by Wakefield Research, which provides a deeper look into the challenges IT and security decision-makers face, the impacts of these challenges, and possible solutions.

Blumira speeds time to market by building with LimaCharlie

Like all cybersecurity providers, Blumira has had to respond to the rise of remote and hybrid work models. But given Blumira’s focus on SMBs and mid-market companies, they found many businesses in their target market priced out of mature endpoint monitoring solutions—or without the technical ability and infrastructure to run the endpoint agents a larger organization might use.

Securing private applications with CrowdStrike Zero Trust Assessment and AWS Verified Access

CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.