Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Extend endpoint visibility with Google Chrome and Splunk security

Ever wondered how to find bad actors using only browser data? Attend this session to get a deeper understanding of the integration between Google Chrome and Splunk. See how to ingest data, and use it for threat hunting and adversarial identification. Speaker: James Young - Staff Security Strategist.

Traditional vs Digital Onboarding- Benefits of Online Customer Onboarding

According to a survey, due to the impact of the rupee depreciation and lower overall expenditure, financial institutions are attempting to optimise their finances as much as possible, and 83% of banks globally are focused their efforts on cost optimization.

CrowdStrike Cloud Infrastructure Entitlement Management (CIEM)

Identity theft and overly permissive accounts are major challenges faced by organizations in public and hybrid cloud environments. Learn how CrowdStrike Cloud Infrastructure Entitlement Management (CIEM) can increase the security of your cloud infrastructure while simplifying management across clouds.

Inside the Mind of a 'Rat' - Agent Tesla Detection and Analysis

Agent Tesla is a remote access trojan (RAT) written for the.NET framework that has knowingly been in operation since 2014. Threat actors behind this malware have leveraged many different methods to deliver their payload over time including macro enabled Word documents, Microsoft Office vulnerabilities, OLE objects and most recently, compiled HTML help files.

How Do You Know Which Data Room Is Right for Your Needs?

There are hundreds of data room vendors operating in the billion-dollar virtual data room market. It isn't difficult to understand that all the virtual data room providers may not be offering up-to-the-mark services. Some may lack in the data security department, while others may not be good in document management. In fact, the changing dynamics of different business sectors also demand customized solutions. That's why even high-end online data room software may not be what you need for your business or personal use.
Featured Post

Bridging the DevSecOps Application Connectivity Disconnect via IaC

Anat Kleinmann, AlgoSec's Sr. Product Manager and IaC expert, discusses how incorporating Infrastructure-as-Code into DevSecOps can allow teams to take a preventive approach to secure application connectivity.

Password attacks: How to combat them

“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” – Clifford Stoll, Astronomer and engineer This identity security week, it’s important to understand the importance of passwords in cybersecurity, how easily they can be compromised if you are not careful, and how ManageEngine ADSelfService Plus helps fortify your passwords and enhance your organizational security.