Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Placing Threat Groups Under a Microscope: Lapsus$

This report is the first in a series of blogs that will delve into the deep research the SpiderLabs Threat Intelligence team conducts daily on the major threat actor groups currently operating globally. The information gathered is part of a data repository to help SpiderLabs identify possible intrusions as it conducts threat hunts, vulnerability scans, and other offensive security tasks.

Governing access to the Microsoft Dynamics estate

ERP and CRM systems are key parts of an organization’s business infrastructure and digital transformation initiatives. One Identity frequently works with customers who use systems from vendors such as SAP, Salesforce and Oracle, and we are seeing more organizations using Microsoft Dynamics products. This is probably due to two factors: a heightened awareness of the importance of Identity Governance to the Dynamics community, and the growth in the adoption of Dynamics products.

#144 - How to think about IR with Lee Sult, Chief Investigator at Binalyze

On this episode of The Cybersecurity Defenders Podcast we sit down with Lee Sult, Chief Investigator at Binalyze, and talk about incident response (IR). Lee is a seasoned cybersecurity expert and investigator with extensive experience in digital forensics and incident response. He is the Chief Investigator at Binalyze and has a strong track record at prestigious organizations like Trustwave-SpiderLabs and Palantir. Lee has supported the US Secret Service and managed complex cybersecurity incidents for Fortune 50 companies.

Best Practices for Implementing Cloud Migration Security

As modern businesses increasingly rely on cloud services, securely migrating data to the cloud has become crucial. Effective cloud migration allows organizations to leverage external expertise and resources while maintaining data integrity and compliance. This guide provides a comprehensive understanding of secure cloud migration, best practices, essential security measures, and successful real-world examples to help businesses benefit from these practices without compromising data security.

Top 5 reasons to fuzz embedded systems

One of the most effective security testing methods for embedded systems is fuzz testing. It’s the fastest way to identify memory corruption errors and their root cause. It enables a shift-left testing approach, recommended by many industry standards, and reaches up to 100% code coverage. Read on for the details.

Securing Your Sensitive Data: Top 7 Cloud Migration Strategies and Best Practices

Cloud migration refers to the process of moving data, applications, and other business elements from on-premise data centers to a cloud computing environment. This transition is crucial for modern businesses aiming to enhance their operational efficiency, scalability, and flexibility. Cloud migration offers numerous benefits, including cost savings, improved performance, and the ability to leverage advanced technologies like AI and big data analytics.

The Importance of Firewall Logs

A firewall is a crucial network security element that forms a barrier between an internal network (e.g. a company's intranet) and external networks (e.g. the Internet). A firewall's main objective is to regulate and monitor incoming and outgoing network traffic based on prescribed rules. This helps prevent unauthorized access, safeguards sensitive data, and mitigates security risks.