Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How To Protect Data in Motion with DLP Software

As companies handle increasingly sensitive information, securing data in motion—the data actively transferred across networks or between devices—has become an important priority. Whether moving through corporate networks, across mobile devices, or stored in the cloud, this data is particularly vulnerable to threats from malicious actors, insider threats, and unauthorized users.

Elastic AI Assistant and Attack Discovery integrate with Google Vertex AI to help drive further AI adoption

AI-driven security analytics reduces analyst burnout Most SIEM technologies in today’s market have not kept up with the pace of innovation and place a heavy burden on security analysts to perform manual, labor-intensive tasks in order to maintain defenses. Generative AI is helping security professionals address today’s dynamic threat landscape and prepare for future threats.

Hacker Summer Camp 2024 | The 443 Podcast

Our very own Corey Nachreiner and Marc Laliberte took on BlackHat and DEFCON this year, and they’ve got all the insider scoop! From cutting-edge tech to interesting hacks, they’re breaking down the coolest moments from both events. Ready to geek out? Binge-watch all three action-packed episodes now in our bio.

The Power of Multifactor Authentication and a Strong Security Culture

The business mantra "employees are our number one asset" is true for many reasons. Including helping protect an organization from cyber threats. An organization can have the finest security technology stack available, employ offensive security measures such as penetration tests, and have a cybersecurity vendor on speed dial in case an incident occurs. However, if its workers are not cybersecurity conscious, all that effort and financial outlay will be wasted.

Common Trends in the MSP Industry

The managed service provider (MSP) landscape is experiencing rapid evolution as businesses increasingly rely on external IT support. To gain valuable insights into the industry’s current state, we interviewed Bill Hammelman of CCP Tech and Bill Hughes of Weehooey as part of the JumpCloud Partner Success Interview series. This blog post delves into common trends and challenges faced by MSPs based on their expertise.

How Are SMEs Approaching IT Security?

Security remains a thorny issue for small- to medium-sized enterprises (SMEs), consistently topping the list of challenges for IT professionals in JumpCloud’s biannual SME IT Trends survey. In our latest edition, IT pros shared their real-world experiences and strategies around security, among other pressing topics. This blog will dive into those insights to reveal how SMEs are tackling the security landscape today.

#147 - Product development with Vijay Pitchuman, Director of Product for Identity Management at Okta

On this episode of The Cybersecurity Defenders Podcast we talk about cybersecurity product development with Vijay Pitchuman, Director of Product for Identity Management at Okta.

How To Prevent Account Takeover Attacks

An account takeover attack is a type of identity theft that occurs when a cybercriminal gains access to your online account and changes your login credentials to lock you out. Once you cannot log back in, a cybercriminal will use your identity to steal private information or even scam others. You can prevent account takeover attacks by using strong passwords, enabling Multi-Factor Authentication (MFA) and investing in dark web monitoring.

How To Avoid Falling for Medicare Scam Calls

You can avoid falling for Medicare scam calls by blocking unknown numbers, refusing to give out your personal information to unsolicited callers and staying informed about common phone scams. Although all types of scams can be dangerous, scams involving Medicare endanger their targets by potentially compromising their health insurance and identity. Read more to learn what Medicare scam calls are, how they work, some common examples and how you can avoid falling for these scams.