Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Defender to Defender: Voice of the Customer Webinar with Sysdig

As more companies move their operations from on-prem to the cloud, they are turning to Sysdig which provides tools to secure containers, Kubernetes, and cloud services. The Sysdig Threat Research Team, which now numbers close to 20 threat research engineers, includes computer security and machine learning experts from around the world.

Leveraging Zero Trust and Threat Intelligence for DDoS Protection

With the growing number of botnets escalating the danger of denial of service attacks, companies are increasing their focus on DDoS defense. The Zero Trust architecture plays a crucial role in this endeavor, helping to secure networks from being used as weapons and ensuring that only verified and authorized individuals can access resources.

Is Cybersecurity Automation on Your List of New Year's Resolutions? 6 Tips to Help

Every year, millions of people make New Year’s resolutions, both personally and professionally, and we all know how difficult resolutions can be to keep. One of the top workplace resolutions cybersecurity professionals are making this year is to pursue security automation initiatives.

CleanINTERNET Controls for TikTok Available Following US Lawmakers Ban

In the last week, The U.S. House of Representatives ordered its staff and lawmakers to delete TikTok from any government-issued mobile device due to security concerns with the popular video-sharing app. But, it’s not just the government taking action for a potential security vulnerability. A handful of college campuses announced that they are banning access to TikTok from campus WiFi in accordance with their respective governors’ executive orders.

CTI: The Cyber Threat Intelligence Guide

Cyber threats continue to evolve, with cyberattacks happening in the world every 39 seconds. That’s why cybersecurity has become one of the topmost concerns in many organizations. Despite many intelligent defense mechanisms organizations leverage, emerging cyber threats continue to disrupt businesses in many ways. Cyber Threat Intelligence is the best way for organizations to mitigate the risks of new cyber threats in the future. In this article, I’ll explain…

Expose and Disrupt Adversaries Beyond the Perimeter with CrowdStrike Falcon Intelligence Recon

Cybercriminals continuously adapt to stay a step ahead of the organizations they target. Over more than a decade, CrowdStrike has carefully tracked the evolution of eCrime tactics and capabilities and codified them in more than 4,900 intelligence reports. Today’s threat landscape is dominated by sophisticated ransomware operators and data extortionists that are supported by a robust and increasingly specialized market-based ecosystem of criminal service providers.

Instilling a Higher Level of Trust: Miles & Stockbridge

In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?

Instilling a Higher Level of Trust: Miles & Stockbridge

In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?

Welcome & Keynote: Increasing Attack Surface for FSIs

FSIs often have some of the most comprehensive and mature security controls across all industry sectors, but the rewards are high for criminals who seek to gain direct access to their network and valued customer data. As FSIs update their IT and security technology and programs, managing the growing attack surface will continue to become more complex and dispersed. In this session, SafeBreach Director of Research Tomer Bar will share how attacks are conducted, which APT group have been the most active, and what risks they pose to FSI’s.