Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Howler Episode 9: Andy Hill, Chief Legal Officer & General Counsel

This month we sit down with Andy Hill, Chief Legal Officer & General Counsel, as he shares why he's always been drawn to corporate law versus litigation, how he navigates providing counsel during difficult situations, taking companies through IPO, and so much more!

What Really Grinds My Gears In Infosec!

Welcome to Razorwire! Join me, Jim, and my guests Chris Dawson and Iain Pye, as we dive into the daily frustrations and pressing issues facing cybersecurity professionals. This episode is filled with insights, gripes, and laughable clichés that saturate our industry. From award ceremony hype to exaggerated LinkedIn credentials, we tackle it all. Stay tuned and subscribe for a candid look at the ups and downs of working in infosec.

Building a Robust Vendor Risk Management Dashboard

In today’s interconnected business landscape, outsourcing to third-party vendors and service providers is an effective method for most organizations to improve operational efficiency and lower financial costs. However, as businesses form third-party partnerships, they inherit potential risks and increase the complexity of their third-party ecosystem, as any one vendor can become an attack vector that cybercriminals exploit to pursue a data breach.

Social Media Cybersecurity: Don't Let Employees Be Your Weakest Link

Maintaining an active social media presence can be a great way to improve brand visibility and generate leads, but it also opens the door to cybersecurity risks — from phishing scams and malware to identify theft and data breaches. If employees accidentally post confidential information or click dodgy links via corporate accounts, cybercriminals can launch malicious attacks that can cause lasting damage to your business (67% of data breaches result from human error).

Ultimate Protection: CyberArk Secure Browser & Proofpoint Anti-Phishing Integration | CyberArk

Discover the next level of web security with the CyberArk Secure Browser! In this video, we dive into the powerful features of CyberArk's Secure Browser, designed to provide: Granular Policy Controls Data Exfiltration Prevention Session Monitoring Credential Security Privacy Enforcement But that's not all! We also explore how combining CyberArk's Secure Browser with Proofpoint's industry-leading anti-phishing capabilities offers users comprehensive, real-time protection against phishing sites attempting to steal credentials and sensitive data.

Adding Windows Devices | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover how to add your company's Windows devices to your JumpCloud directory leveraging the JumpCloud agent. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Introducing the SIEM of the Future: Splunk Enterprise Security 8.0

It’s been an exciting year for Splunk Enterprise Security! In May, we celebrated being recognized as a Leader ten times in a row in the 2024 Gartner Magic Quadrant for SIEM. We’re not stopping there. We’re excited to introduce the SIEM of the Future to keep the momentum going. Splunk Enterprise Security 8.0 is available now in a private preview.