Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 56 - Time as Attack Surface

In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at Rate (formerly Guaranteed Rate), highlights the importance of swift decision-making and prompt threat response. They discuss the role of just-in-time (JIT) access and AI in accelerating response times, as well as the ever-evolving threat landscape that requires constant vigilance.

Secure API Management for LLM-Based Services

API Management is a comprehensive process that involves creating, publishing, documenting, and overseeing application programming interfaces (APIs) in a secure, scalable environment. APIs are the backbone of modern software architecture, enabling interoperability and seamless functionality across diverse applications. They facilitate the integration of different software components, allowing them to intercommunicate and share data efficiently.

From Policy to Practice in Security Culture: What Security Frameworks Recommend

Recently I had to prepare for a governance, risk and compliance conference. I promptly realized that although I used to be quite immersed in this field as an ISO 27k implementation consultant and even a short stint as a Payment Card Industry (PCI QSA) auditor years ago, it has been a while since I looked into this.

Why Implementing Identity Security Doesn't Have to Be Complicated

Every organization is different, with its own unique needs, challenges and goals. That means that IT solutions, and especially IT security, must be complex tools that are highly configurable and adaptable to various scenarios. IT security solutions must be flexible and robust enough to handle many situations.

Understanding the NIS2 Directive: Who is Affected and What You Need to Know

Time is of the essence, as the transposition deadline for the NIS2 Directive approaches on October 17, 2024, organizations across the EU must brace for its significant impact. This new Directive, updating and expanding its predecessor (NIS1), will dramatically increase the number of regulated entities. According to Ireland’s National Cyber Security Centre, the number of regulated entities is expected to rise from about 120 under NIS1 to an estimated 3,500 under NIS2.

SSH Snake - Tanium Tech Talks #95

In January of 2024 the #Linux / Unix world was rocked by a script that worms its way through insecure SSH connections to map your environment. A team of two Tanium SMEs built content that you need to find and map your exposure, giving you the information necessary to remediate your environment. But #Windows and #MacOS are not off the hook. SSH services on other platforms have the same exposure. Use this Tanium content to find the issue everywhere it is applicable.

OpenSSH regreSSHion Vulnerability - The 443 Podcast - Episode 296

This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover OpenSSH's recent critical vulnerability and what it means for systems administrators. Before that, we discuss the CDK Global ransomware attack impacting car dealerships across the U.S., a Korean internet service provider delivering malware to their customers, and a takeover of a popular JavaScript library gone hostile.

Defense Supply Chain Data Security

The defense supply chain is a complex network of partners that sell, manufacture, and distribute services or products to defense agencies worldwide. It is made up of both major corporations and smaller sub-suppliers. Each country has its own network of supply chain partners, including manufacturers, software, services and logistics providers that deliver products and services for military materiel applications.

MDR for MSPs: the key to strengthening your portfolio and protecting your customers

Managed service providers (MSPs) are key players in enterprise security, providing critical security services for customers who often lack in-house teams to manage them. However, the cyberthreat landscape is growing increasingly complex and challenging, even for these experts.