Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Using the Azure PKI Solution for IoT Security

Public Key Infrastructure (PKI) is a set of policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The purpose of PKI is to facilitate secure electronic communications by authenticating users and devices. Organizations that use PKI can be assured that their messages are confidential and tamper-proof because each message is encrypted with a unique key that only the intended recipient can decrypt.

OneLogin and AWS CloudTrail Lake Integration

As an AWS Partner, One Identity is proud to announce that it is now even easier to leverage your existing AWS tooling with your OneLogin data. We are among the first partners to offer a new integration that joins tools, such as our previously released AWS EventBridge webhook. Now, AWS and One Identity have teamed to deliver an integration with AWS CloudTrail Lake, which allows you to store your OneLogin event data in AWS along with all your other data.

Introducing SSH command controls and advanced PEDM capabilities for Linux in PAM360

PAM360 is ManageEngine’s comprehensive privileged access management (PAM) solution designed for enterprises to protect sensitive, privileged identities from internal and external threats. With the principle of least privilege enshrined across the product, PAM360’s privilege elevation and delegation management (PEDM) capabilities help enterprises eliminate standing privileges and provide granular privileged access in a restricted, time-based manner.

Building blocks for Cyber resilience: MSSPs can lead the way

In today's world, cybersecurity is an ever-growing concern for businesses. With the rising threat of cyber threats and data breaches, it can be difficult for companies to keep up with the latest security technologies and stay ahead of the curve. Managed Security Services Providers (MSSPs) provide comprehensive security solutions to clients. They offer various services, from monitoring and threat intelligence to incident response.

Modern SOC and MDR Series III: The Different Roles within a Modern SOC

Modern SOCs are highly specialized security operations centers whose objective is to detect attackers who have gained access to an organization's device or network. Built around complex environments, a team of cybersecurity experts who have been assigned different roles coordinate operations at SOCs.

Unlocking the power of AI and Natural Learning

In Calligo’s latest Beyond Data podcast, co-hosts Sophie Chase Borthwick and Tessa Jones are joined by Alexander Visheratin, Artificial Intelligence Engineer at Beehive AI. Here we explore some of the episode’s highlights; the importance of Natural Learning Processing (NLP) and the pros and cons of output produced by examples like OpenAI’s ChatGPT-3.

Breaking into Cybersecurity: A Military Veteran's Journey

Getting into cybersecurity can seem daunting, but for military veterans, it's a natural transition. In this video, we follow one veteran's journey as they use their resettlement money to fast-track their career in cybersecurity. From getting the basics with certifications like CompTIA Security Plus and Network Plus to eventually obtaining their CISSP, watch as they navigate the world of cyber security and share their insights and surprises along the way.