Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Installation Guide: Installing Your LED Bathroom Mirror Like a Pro

Installing an LED bathroom mirror can seem intimidating, but with the right tools and guidance, you can do it yourself like a pro. This friendly and casual guide will walk you through the step-by-step process to help you install your new LED bathroom mirror safely and securely.

Innovating Security with Managed Detection & Response (MDR) and ChaosSearch

Managed Detection and Response (MDR) services occupy an important niche in the cybersecurity industry, supporting SMBs and enterprise organizations with managed security monitoring and threat detection, proactive threat hunting, and incident response capabilities.

How to Automate IIS Hardening Script with PowerShell

IIS hardening can be a time-consuming and challenging process. PowerShell can help you achieve hardened IIS security settings to some extent, but it still requires hours of testing to ensure that nothing is broken. CSS by CalCom can automate the IIS hardening process with its unique ability to “Learn” your network, eliminating the need for lab testing while ensuring zero outages to your production environment.

Evaluating dependence on NVD

As I mentioned at the beginning of this year, I am trying to do a monthly blog post on what might be termed “Major Security Events”. In particular this year, I’ve written about the Ivanti meltdown, Lockbit ransomware, and the xz backdoor. These events usually emerge cacophonously and suddenly into the cybersecurity landscape, and generally get everyone’s attention “real quick”.

Cato's game-changing MSASE Partner Platform: Because service providers also needed a break

Managed service providers tell us they see great opportunity from so many businesses migrating to SASE. But many struggle to take advantage of it. Why is that? In this post, we’ll examine why service providers can find it hard to build a Managed SASE (MSASE) service, and four things they need when launching one.

The Future Of AI At Arctic Wolf

Arctic Wolf is addressing the exponential scale of security threats to business worldwide with our fusion of human intelligence, artificial intelligence, and one of the world’s largest data-streams of security observations. Join Arctic Wolf’s Dan Schiappa, Chief Product Officer, and Ian McShane, Vice President of Product, as they share their vision for AI in the context of the industry-leading Arctic Wolf Security Operations Cloud.

Teleport 16

It’s that time again — for a brand new major release. Our team releases major versions of Teleport every 4 months. Here we introduce Teleport 16. This post goes into detail about Teleport 16 breaking changes, bug fixes and improvements. In Teleport 16, we focused on new features and enhancements to enable our customers to implement mitigations to protect against an IdP Compromise.

Vacation-Themed Scams Are Spiking

Scammers are now impersonating legitimate services like Booking.com and Kayak to target people planning their summer vacations. One out of every 33 vacation-themed domains registered last month was malicious, researchers at Check Point warn. “In May 2024, Check Point Research (CPR) detected a significant surge in summer-related cyber scams, highlighting the need for travelers to stay informed and proactive in safeguarding their personal information,” the researchers write.

The Indispensable World of Red Teaming

In this mad, mad world of breaches, organizations are scrambling to keep their heads above water. It's like trying to navigate a minefield while blindfolded and riding a unicycle — one wrong move, and everything goes up in flames. So, how do you know your security controls are up to the task of defending your organization? This is where red teaming comes in.