Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Level Up Your MSP Game

Attending industry events is quite possibly one of the most important requirements of running a successful managed service provider (MSP) business. Why? On the one hand, a few days away from the day-to-day grind of running your MSP to instead network with your peers and enjoy some MSP swag seems like the perfect opportunity to unwind while staying connected. On the other (equally as important!) hand is all the great learning going on.

CVE-2024-24919: Zero-Day Vulnerability Detected in Check Point Products

Note: This vulnerability remains under active exploitation, and Kroll experts are investigating. If further details are uncovered by our team, updates will be made to the Kroll Cyber Risk blog. A critical zero-day vulnerability, being tracked as CVE-2024-24919, has been discovered and patched in a number of Check Point products. This vulnerability has a CVSS score of 8.6 assigned by Check Point and is actively being exploited in the wild with proof of concept (POC) exploits available.

Reducing false positives with automated SIEM investigations from Elastic and Tines

One of the biggest SIEM management problems SOC teams face is that they are often overwhelmed by false positives, leading to analyst fatigue and visibility gaps. In addition to that, one of the toughest challenges in security is detecting when SaaS access tokens are compromised without adding to the false positive problem. At Elastic, the InfoSec team tackles both of these issues by automating SIEM alert investigations with tools like Tines.

The Ultimate Guide to FedRAMP Marketplace Designations

Whenever a government agency, contractor, or subcontractor wants to work with a cloud service provider, they have to find one that upholds the level of cybersecurity, physical security, and authentication that the government sets as standard. Usually, agencies have two options to do this. They can work with a cloud service provider that is FedRAMP authorized, or they can work with one that is FedRAMP Equivalent.

8 Reasons to Conduct Regular Vulnerability Scans

Vulnerability scanning is a critical component of any robust Offensive Security strategy. When combined with penetration testing and Red Team exercises, they can serve as an early warning system to identify potential security weaknesses and provide an organization with the breathing room needed to implement changes before they are discovered and exploited.

Understanding Attackers: The Key to Effective Cyber Defence

In this clip, Robert Black emphasises the importance of understanding attackers' decision-making processes. By building networks with the attacker's perspective in mind, organisations can better influence and deter potential threats. Learn why considering the human element in cyber threats is crucial.

Unlocking Success: The Power of Strategic Alliances in Tech | John Szczygiel's Insights

Dive into the world of strategic alliances with John Szczygiel as we explore how open and flexible technological solutions can be a game-changer for businesses aiming for success and competitiveness in today's fast-paced market. Discover the critical role of strategic partnerships in driving innovation and growth, and learn why adopting such technologies is more than a choice—it's a strategic imperative.

The Benefits of Passwordless Authentication

Many organizations are planning to adopt passwordless authentication or are already in the process of doing so. Passwordless authentication has many benefits such as being more secure than traditional passwords, providing a better user experience, reducing helpdesk costs and enhancing productivity. Continue reading to learn more about the benefits of implementing passwordless authentication in your organization and how Keeper helps with its implementation.