Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

False Positive or the Real Deal?

An ominous flashing red light on a blacked-out computer screen means the promise of a threat. It was 21:26 on a Sunday night and an Intrusion Prevention System (IPS) alert shot across one of our screens. A security analyst usually has just minutes to respond, carry out an investigation on behalf of the organisation under threat and make a critical decision.

Defend Your Data Now with the MITRE ATT&CK Framework

MITRE is a not-for-profit organization that operates federally-funded research and development centers. Their ATT&CK framework is a useful cybersecurity model illustrating how adversaries behave and explaining the tactics you should use to mitigate risk and improve security. ATT&CK stands for “adversarial tactics, techniques and common knowledge.”

Privileged Access Management Best Practices Using SSH and Teleport

Gravitational CTO, Sasha Klizhentas, goes through the best practices for setting up privileged access management when using SSH to access cloud-native server infrastructure. He also describes how these concepts are applied to Teleport - privileged access management for elastic infrastructure that doesn't get in the way.