Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Take the fear out of phishing response: Lessons from Material Security

For modern security teams, phishing remains one of the most persistent and resource-intensive challenges their organizations face. But automating the detection and response to phishing attacks not only saves time, but also reduces errors and strengthens your organization's overall defense.

Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Mark Hillick, CISO at Brex. Mark’s experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys.

April 22, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Palo Alto Confirms Brute Force Campaign Against PAN-OS Devices Worldwide Following Kroll's previous bulletin highlighting a report from GreyNoise indicating a large uptick in activity targeting Palo Alto devices, it has been confirmed that Palo Alto has detected an ongoing campaign to brute force login credentials to PAN-OS devices.

Cybersecurity Threats: What You Need to Know About Piggybacking

In cybersecurity, piggybacking refers to an unauthorized person gaining access to a restricted area or system by exploiting the access privileges of an authorized user, typically by following them or leveraging their credentials, usually without their knowledge or consent.

Latest PCI DSS Standards: Use Third Parties - But at Your Own Risk

Third parties have long been the hidden heroes of the payment card industry, providing specialized, streamlined support to merchants looking to host a website or spin up an app. But that convenience is not without a cost. According to PCI DSS 4.0 compliance standards, although merchants are free to use third parties, the responsibility for any incurred security liability will be all theirs. When a merchant takes on an outside provider, they are taking on their cybersecurity risk as well.

Digital Hygiene in Healthcare: Where Cybersecurity Is a Matter of Life and Death

The healthcare industry is a prime target for cyberattacks due to the significant value of medical data and the critical nature of patient care. Unlike other sectors, healthcare organizations must balance cybersecurity with the need for immediate access to life-saving information. Ransomware attacks, in particular, have surged, with cybercriminals exploiting outdated systems, unpatched vulnerabilities, and human error to disrupt operations.

Less noise, more signal: How Elastic Defend slashed event volume

When an EDR tool generates too much endpoint telemetry, security teams quickly run into problems. Mountains of process events, network connections, and file operations can overwhelm analysts, making it harder to spot real threats in the noise. High data volumes drive up storage costs, slow down searches, and contribute to alert fatigue — leading to longer investigation times and potential blind spots.