Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are Your Employees Creating Risks For Your Organization While Working at Home?

This is the important question that Veriato Head of Product & Technology, Jay Godse asks in his new article, published this week. With so many employees working from home, it’s hard for CISOs, managers and HR leaders to know what they are doing, and that creates risk. Don’t wait until it’s too late. Threats to the company are much harder to spot when people are working at home.

Industrial Spy - Keep your Friends Close

In recent weeks, Cyberint has been monitoring a new marketplace that appeared in the TOR network, an insiders network called Industrial Spy. This new platform was established in around mid-March this year and is currently being promoted on known Darknet forums and Telegram channels. The platform’s main goal is to become the ultimate repository containing victims’ data, which is mainly gathered by threat actors and insiders.

5 Questions to Ask Before Implementing an XDR Program

Ladies and gentlemen of all ages and security roles, let us dive head-first into this newish thing called XDR. There is no shortage of vendors, and researchers, providing you their definition on what XDR actually represents so it becomes is there one you agree with or not. Taking a slightly different tact to explore what does XDR mean to you, and your security team.

April Developer Roll Up

The months continue to peel off of the calendar and Spring is in the air. As usual, the team at LimaCharlie has been busy pushing the state of cybersecurity forward. In the last month, we have fixed some bugs, brought real-time detections into the web application, and launched a new sensor type. On May 19th at 10.00 AM PST join us as we present a webinar on how to reduce security tooling spend by augmenting Splunk and other high-cost data solutions with LimaCharlie.

Egnyte Platform Overview - In Less Than 3 Minutes

This video provides a quick overview of Egnyte’s content collaboration, data security and compliance & audit platform, in just a few minutes. By watching this video, you’ll learn about Egnyte’s Content Intelligence Engine and its 6 key elements. You’ll also find out about the key capabilities of each platform element, which are recapped below: Egnyte is a leader in cloud content security and governance, and our leadership is driven by Egnyte’s Content Intelligence Engine.

What's new in Elastic Security 8.2: Streamline analyst workflows with context and expertise

Elastic Security 8.2 powers the efficiency and effectiveness of security teams, arming analysts with invaluable insights and deep visibility into the attacks targeting their organization. The release delivers rich alert contextualization, osquery host inspection directly from an alert, new investigation guides, and the general availability of threat intelligence. Let’s jump in.