Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Applying Military Mindset to Cyber Security: A Holistic Approach

In this video, we explore how the military mindset and training can be applied to the cyber security domain. With a focus on defense in depth and a holistic approach to security, individuals in the forces community bring a unique perspective to the field. From personal weapons to security centers and countermeasures, the skills and methodologies learned in basic training can be translated to the cyber security space. By managing multiple streams and having a wider oversight of all domains, the elements can fit together seamlessly for a comprehensive and effective cyber security strategy.

Using the Azure PKI Solution for IoT Security

Public Key Infrastructure (PKI) is a set of policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The purpose of PKI is to facilitate secure electronic communications by authenticating users and devices. Organizations that use PKI can be assured that their messages are confidential and tamper-proof because each message is encrypted with a unique key that only the intended recipient can decrypt.

OneLogin and AWS CloudTrail Lake Integration

As an AWS Partner, One Identity is proud to announce that it is now even easier to leverage your existing AWS tooling with your OneLogin data. We are among the first partners to offer a new integration that joins tools, such as our previously released AWS EventBridge webhook. Now, AWS and One Identity have teamed to deliver an integration with AWS CloudTrail Lake, which allows you to store your OneLogin event data in AWS along with all your other data.

Introducing SSH command controls and advanced PEDM capabilities for Linux in PAM360

PAM360 is ManageEngine’s comprehensive privileged access management (PAM) solution designed for enterprises to protect sensitive, privileged identities from internal and external threats. With the principle of least privilege enshrined across the product, PAM360’s privilege elevation and delegation management (PEDM) capabilities help enterprises eliminate standing privileges and provide granular privileged access in a restricted, time-based manner.

Building blocks for Cyber resilience: MSSPs can lead the way

In today's world, cybersecurity is an ever-growing concern for businesses. With the rising threat of cyber threats and data breaches, it can be difficult for companies to keep up with the latest security technologies and stay ahead of the curve. Managed Security Services Providers (MSSPs) provide comprehensive security solutions to clients. They offer various services, from monitoring and threat intelligence to incident response.

Modern SOC and MDR Series III: The Different Roles within a Modern SOC

Modern SOCs are highly specialized security operations centers whose objective is to detect attackers who have gained access to an organization's device or network. Built around complex environments, a team of cybersecurity experts who have been assigned different roles coordinate operations at SOCs.

Unlocking the power of AI and Natural Learning

In Calligo’s latest Beyond Data podcast, co-hosts Sophie Chase Borthwick and Tessa Jones are joined by Alexander Visheratin, Artificial Intelligence Engineer at Beehive AI. Here we explore some of the episode’s highlights; the importance of Natural Learning Processing (NLP) and the pros and cons of output produced by examples like OpenAI’s ChatGPT-3.