Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is Linux Identity and Access Management?

Identity and access management (IAM) provides a consistent, centralized solution to manage user identities and automate access control throughout the organization. This helps security leaders introduce role-based access control and meet governance, risk, and compliance goals. Your organization may already have centralized management policies in place. For example, requiring employees to use a VPN when accessing company assets remotely shows an IAM solution in action.

Digital Mercenaries: Unveiling the Cyber Side of Chaos || Razorthorn Security

Explore the complexities of using tenants in the digital world in our latest video Discover how their strategies mirror those used in physical activity, from detecting vulnerabilities to creating chaos. Learn how these digital mercenaries act as the first line of offense, uncovering vulnerabilities before handing them over to professionals for penetration. Join the discussion as we discuss the implications of their actions and the role they play in cybersecurity.

Mercenary Cyber Warfare: Expanding Tactics Beyond the Battlefield || Razorthorn Security

Dive into the realm of mercenary cyber warfare in our latest video. Explore the implications of mercenary groups branching into cyber operations, disrupting grids, and targeting crypto wallets. Join the conversation as we examine the potential havoc these tactics could wreak and the motivations behind such endeavors. #mercenary Other episodes you'll enjoy With new episodes every other Wednesday, Razorwire is a podcast for cybersecurity enthusiasts and professionals providing insights, news, and fresh ideas on protecting your organization from hackers.

What Is Privilege Creep?

Privilege creep is a cybersecurity term that describes the gradual accumulation of network access levels beyond what an individual needs to do their job. Users need specific privileges to perform tasks and job functions. These privileges can include accessing sensitive data, installing new programs, updating software, configuring networks, adding new users and more. Not every user needs to be granted all privileges to do their job.

Disable IPv6

Internet Protocol version 6 (IPv6) is a network layer protocol that facilitates communication across the internet by assigning unique IP addresses to each device for identification and location purposes. With the onset of the digital era in the 1990s, the limitations of IPv4 addresses in accommodating the escalating demand became evident. Consequently, the Internet Engineering Task Force (IETF) embarked on developing the next-generation internet protocol, leading to the emergence of IPv6.

Friday Flows Episode 22: Run a Simulated Phishing Attack on your employees

A fundamental pillar of cybersecurity continues to be employee education & awareness. Today's Friday Flows features an easy way to test your employees & teach them to keep an eye out for suspicious emails. 👀 This Tines story created by Conor Dunne grabs a list of employees from your HR system and sends them a simulated phishing email. A Tines Case will be created to track if a link in the email is clicked.

Elastic's Mandy Andress on switching from a tech-first to people-first approach to security

To kick off season 5 of the Future of Security Operations podcast, Thomas is joined by Mandy Andress. Mandy is the Chief Information Security Officer at Elastic, a leading platform for search-powered solutions, and has more than 25 years of experience in information risk management and security. Before Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She also founded an information security consulting company with clients ranging from startups to Fortune 100 companies.