Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Friday Flows Episode 31: Analyze Elastic alerts, block IPs, and notify in Slack and Tines Cases

FRIDAY FLOWS #31 - Analyze Elastic alerts, block, IPs, and notify in Slack and Tines Cases Personally, my favourite partners to work with. Elastic and Tines go hand in hand technology wise. Whether you're using Elastic for SIEM, Cloud Security, Endpoint, or outside security like Observability, Tines acts as the automation glue for those tools. I hope you enjoy today's episode with Michael Tolan and as always, check out the Tines community edition in the comments to play around with this specific story and more.

How To Stop A DDoS Attack

On a Friday afternoon at 5 PM, you’re cruising along the backroads in your car, listening to your favorite music. You’re on vacation and making excellent time to your destination until you notice the long stream of red tail lights a few miles ahead. After sitting in standstill traffic for over an hour, you realize that highway construction created a detour to the two-lane backroad that you were using to skip the rush hour traffic.

What Steps Are Involved in An ISO 27001 Audit?

As the strongest and most well-recognized security certification around the world, ISO 27001 is a very popular – and very stringent – framework to adhere to. If you’re a business operating anywhere in the world, and you want to achieve security levels that build confidence and open doors with customers and clients who value trust, ISO 27001 is a great option.

Magecart Attack - Techniques, Examples & Preventions

Magecart attacks are a form of digital skimming that targets insecure websites to steal payment information. These attacks involve injecting malicious JavaScript code into e-commerce websites to steal sensitive information such as credit card details during the checkout process. The term “Magecart” originates from the attackers’ initial focus on Magento, a popular e-commerce platform, though their methods have since expanded to target various other platforms.

"Will the Real Platform Please Stand-Up" at Black Hat 2024 - Presented by Maxime Lamothe-Brassard

LimaCharlie CEO, Maxime Lamothe-Brassard, presented "Will the Real Platform Please Stand-Up" at Black Hat 2024. Max dissected the characteristics that actually matter to security practitioners, exploring how a genuine platform should be structured, accessed, and what it must deliver.

A Network Defense Layer That Actually Works

Enterprises invest heavily in cybersecurity measures to protect their critical assets and sensitive data. According to the Worldwide Security Spending Guide published by International Data Corporation (IDC), European security spending will grow by 12.3% in 2024, similar trajectory to the US and Asia Pacific. Despite these investments, crippling vulnerabilities continue to wreak havoc, and the costs of cyber attacks continue to soar.

The Hidden Dangers of Zombie and Shadow APIs-and Why Only Salt Security Can Tackle Them

In today’s hyper-connected digital landscape, APIs are the lifeblood of innovation, powering everything from customer experiences to internal operations. However, with this growing reliance on APIs comes a dark side—zombie and shadow APIs. These hidden, forgotten, or undocumented endpoints present significant security risks that traditional approaches simply can’t address.

Do You Have Multiple Compromised Passwords? Here's What To Do.

A password is compromised when it’s leaked in a data breach and made available on the dark web, allowing others to gain unauthorized access to your online accounts. This risk not only arises from a data breach; your passwords can also be compromised in a phishing attack or if you don’t store your passwords securely. Dealing with multiple compromised passwords can be scary and stressful, but luckily there are steps you can take to protect your online accounts.

How To Protect Yourself From Identity Theft

You can protect yourself from identity theft by safeguarding your Social Security number and other sensitive documents, regularly reviewing your credit reports, using a dark web monitoring tool and not oversharing online. Identity theft occurs when someone steals and uses your sensitive documents unbeknownst to you to gain money or access to your confidential information. Examples of sensitive documents include Social Security numbers, credit card numbers, bank account information and passport numbers.