Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Relative Maintenance Windows - Patch FAQs - Tanium Tech Talks #80

See how to automatically download and deploy patches to your own pre-defined patch rings in today's Patch FAQ, using the new relative maintenance windows feature. Set-it-and-forget-it! This is the trifecta of zero-touch patching: relative maintenance windows, relative patch lists, and on-going deployments. Combine that with dynamic computer groups via tags or randomization for the ultimate experience of patch automation for #Windows and #Linux.

What Can Someone Do With Your Social Security Number?

If someone steals your Social Security number, they can use it to open bank accounts under your name, steal your benefits, file your tax return and commit other types of fraud. Your Social Security number is tied to your identity in the U.S. Without it, you are unable to identify yourself to receive employment and benefits. A threat actor can use your Social Security number for malicious purposes such as stealing your benefits or committing crimes under your name.

Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure

Welcome to Razorwire, the podcast dedicated to exploring the complex and evolving world of cyber security legislation. I'm your host, Jim, and in today's episode, we delve into the intricate landscape of cyber security legislation with our guests Steve Applegate and Phil Tonkin from Dragos.

Egnyte + Google Cloud

Secure sensitive data amid a frictionless collaboration experience with Egnyte and Google Cloud. Automate discovery, control and protection of data wherever work happens to simplify compliance and security processes. Protect data across multi- and hybrid cloud environments, reduce attack surfaces, and enact better data governance — all from a single control panel.

Introducing the SecOps Cloud Platform

Gone are the days of one-size-fits-all security solutions that do not adequately address the complexities of modern networks and evolving threats. These general-purpose tools lack the flexibility to adapt to your unique environment and specific needs. As a result, organizations end up with a fragmented collection of tools that need to be manually integrated and stitched together, leading to inefficiencies, gaps in security coverage, and extreme costs.

Verizon Employee Data Compromised

Verizon is a top-performing communications organization with clients and influence worldwide. They offer various electronic services, including physical technology, Internet services, entertainment programs, communications plans, etc. They enjoy a user base of nearly 145 million people in the US, making them the largest telecoms operator in the states. Verizon recently announced a breach in mid-September 2023; however, the event was not from an external threat actor—it came from an employee.

Critical Windows Event IDs to Monitor

Like most organizations, your company likely invested in various Microsoft products. The Microsoft ecosystem provides businesses with nearly every kind of technology necessary, from workstation operating systems to Azure to Windows 365 that includes cloud-native versions of their traditional Office tools and the communication platform Teams. However, attackers are just as invested in the Microsoft ecosystem.