Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

"The Future of Cyberspace": CyberArk CIO Omer Grossman Keynote session at Cybertech 2024

Listen in on this insightful keynote session from Cybertech 2024, featuring CyberArk CIO Omer Grossman. In "The Future of Cyberspace," He explores the evolving landscape of cybersecurity, addressing emerging threats, innovative defense strategies and the role of advanced technologies in shaping a secure digital future. In this session, you'll learn about: Don't miss this opportunity to hear from a leading expert in the field and gain valuable knowledge that can help protect your organization in an increasingly complex cyberspace.

Kroll Responder Managed Detection and Response - Solution Overview

Stop cyberattacks now with Kroll Responder. In this video, learn how Kroll Responder Managed Detection and Response (MDR) provides extended security monitoring around-the-clock, earlier insight into targeted threats, and complete response to contain and eradicate threats across your digital estate. Discover how our turnkey MDR service can fill gaps in your security resources by combining seasoned security expertise, frontline intelligence and unrivaled response capabilities.

Destructive Malware: Threat Detection and Incident Response

Imagine that you have a snack you want to eat while watching a movie on a Friday night. You look in your kitchen, only to find the snack missing. Whether a roommate hid the snack or ate it, you no longer have access to it, disrupting your evening plans. This destructive behavior interrupts your weekend objectives, but it’s pretty low stakes overall.

PCI DSS v4.0: What You Need to Know and What the End of v3.2.1 Means for the Future of Digital Payments

On March 31st, 2024, The Payments Card Industry Standards Security Council (PCI SSC) officially retired version 3.2.1 of the PCI Data Security Standard (PCI DSS) with the publication of its new sets of protocols and security standards for v4.0. With the continued rise in cyber threats against financial services and institutions, PCI DSS v4.0 supersedes version 3.2.1 to tackle evolving threats and technologies, facilitating enhanced approaches to counteract emerging types of cyber attacks.

Vacation-Themed Scams Are Spiking

Scammers are now impersonating legitimate services like Booking.com and Kayak to target people planning their summer vacations. One out of every 33 vacation-themed domains registered last month was malicious, researchers at Check Point warn. “In May 2024, Check Point Research (CPR) detected a significant surge in summer-related cyber scams, highlighting the need for travelers to stay informed and proactive in safeguarding their personal information,” the researchers write.

The Future Of AI At Arctic Wolf

Arctic Wolf is addressing the exponential scale of security threats to business worldwide with our fusion of human intelligence, artificial intelligence, and one of the world’s largest data-streams of security observations. Join Arctic Wolf’s Dan Schiappa, Chief Product Officer, and Ian McShane, Vice President of Product, as they share their vision for AI in the context of the industry-leading Arctic Wolf Security Operations Cloud.

Fare Thee Well ModSecurity: End-of-Life and Last Commercial Rules Update for June 2024

In June 2010, Trustwave acquired Breach Security, which brought with it the popular Open-Source Web Application Firewall ModSecurity for Apache. At that time, Trustwave relicensed the code under the Apache license. This relicensing allowed more public participation in the project, and 2012 saw the release of an IIS port from Microsoft and a port for Nginx.

Automated Penetration Testing: An Overview

Automated penetration testing, or automated pen testing, is a type of security assessment that uses specialist tools to uncover vulnerabilities. Although it can serve as part of a cohesive security strategy, it also presents some challenges. In this article, we outline the pros and cons of automated pen testing and compare it with manual pen testing.

Unlock Advanced Security Automation for Next-Gen SIEM

According to the CrowdStrike 2024 Global Threat Report, the fastest recorded eCrime breakout time was just 2 minutes and 7 seconds in 2023. This underscores the need to equip security analysts with modern tools that level the playing field and enable them to work more efficiently and effectively.