Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

[Live streaming] Microsoft 365 Cloud Backup: Overcoming Native Data Protection Limitations

Microsoft 365 remains the backbone of many businesses, essential to their daily operations and success. Yet, this reliance exposes a critical gap – how to protect the data it holds and who’s responsible for its protection. Potential threats to Microsoft 365 data vary from everyday mishaps like accidental deletion to malicious attacks like ransomware. The bottom line is that it’s time to rethink your approach to Microsoft 365 data protection and recovery.

Water Barghest: A Stark Reminder of IoT Security Gaps

Trend Micro’s recent report on the Water Barghest threat actor underlines a critical issue that has long plagued the IoT ecosystem: the security shortcomings inherent in many connected devices. With over 20,000 IoT devices compromised and exploited as residential proxies within minutes, this story highlights the growing risks posed by insecure IoT devices and the urgent need for proactive security measures.

How to Combat Alert Fatigue to Retain and Empower Your Security Teams

In the high-stakes world of cybersecurity, organizations must ensure that their teams not only protect the organization but also stay motivated and productive. One of the most insidious threats to achieving this goal is alert fatigue. When analysts are bombarded with thousands of security alerts daily, they risk becoming overwhelmed and disillusioned in their roles.

Security Bulletin: PAN-OS Authentication Bypass and Privilege Escalation Vulnerabilities

On November 19, 2024, Palo Alto Networks disclosed two critical vulnerabilities in its PAN-OS software, CVE-2024-0012 an Authentication Bypas, and CVE-2024-9474 a Privilege Escalation. These vulnerabilities enable attackers to gain unauthorized administrative access and escalate privileges to root level. Exploitation of these vulnerabilities, observed in the wild, has been attributed to a targeted campaign dubbed Operation Lunar Peek.

From Confidence to Competence: Overcoming Secrets Management Challenges

Check out this insightful discussion on the realities of secrets management, featuring Grace Law, Principal Security Engineer in Application Security at a large insurance company, and Chris Smith, Product Marketing Director for Machine Identities & DevSecOps at CyberArk. Together, they’ll share real-world experiences and strategies for overcoming the most pressing challenges in secrets management and security.

A Smarter Approach to Managing Security Services: The SecOps Cloud Platform (w/ MSSP Alert)

As an MSSP or MDR, your success hinges on the quality of your services and growing your customer base - not on managing infrastructure or worrying about uptime. Join us as we look at how LimaCharlie's SecOps Cloud Platform efficiently handles infrastructure, allowing you to focus on service, innovation and delivery. We'll explore how LimaCharlie's flexible, vendor-agnostic platform.

SOC It to 'em: Shifting from Reactivity to Proactivity in Sec Ops with Jessica Hebenstreit

Jessica Hebenstreit, Faculty Member at IANS, presented "SOC It to 'em: Shifting from Reactivity to Proactivity in Sec Ops" for this weeks Defender Fridays session. Be part of our weekly interactive discussion where security professionals share real-world insights and practical knowledge.

4 tips to encourage your team to use 1Password Enterprise Password Manager

So you’ve rolled out 1Password Enterprise Password Manager, successfully onboarded your team – now what? Don’t let the momentum you’ve built go to waste! By building long-term security habits early on you’ll reap the benefits far into the future.

Which Files Do You Need to Encrypt? How to Guarantee Privacy for Your Files

Are you worried about your personal information leaking online? Worried your email has breached online or leaked on the dark web? Unsure if you’re passwords are safe? Don’t worry, you’re not alone. Fortunately, encryption is our friend. It is an advanced technology that prevents hackers from stealing our sensitive information, protects us from data breaches, and ensures businesses can comply with data protection laws.