Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is Your LinkedIn Profile Putting Your Security at Risk?

In today's age of information, it's becoming increasingly easier to gather information on anyone, including their professional lives on platforms like LinkedIn. While it may seem harmless to check out a colleague's profile or connect with a friend, it's important to consider the potential security risks involved. In this video, we explore the growing concern of side-channel attacks, where hackers can gain access to personal information through the connections and networks of individuals. We discuss how to identify potential risks and take steps to safeguard your personal and professional information.

Zero Trust will be the New Normal

As the world fitfully rebounds from the recent Covid-19 pandemic, both our personal and professional lives will be altered. A recent survey by Gartner revealed that 74% of CFOs and Finance leaders said they will move at least 5% of their previously on-site workforce to permanently remote positions post Covid-19. Organizations will evaluate rent costs, health risks, and productivity benefits in the new environment. Some office space will be released.

How Executives Can Stay Safe From Cyberattacks

The C-Suite and other senior executives are frequently the targets of cyberattacks. As the most visible members of an organization, executives have access to sensitive information, influence inside the organization and a public platform, making them valuable targets for cybercriminals. Organizations of all sizes need to actively reduce risk for senior management.

Modern SOCs and MDR services IV: Deployment Models

Currently, it is possible to offer managed detection and response services from a SOC that are implemented in different ways. All implementation alternatives have their advantages and disadvantages, which must be carefully evaluated before deciding to adopt one or another deployment model. The most common deployment models include.

The importance of event correlation techniques in SIEM

Event correlation tools are a fundamental instrument in your toolbox to detect threats from all sources across your organization in real time. A wise use of the right event correlation techniques through log management and analysis is the cornerstone of any reliable security information and event management (SIEM) strategy – a strategy that focuses on prevention rather than reaction.

Fuzzing in Jest - One Unified Workflow for Functional and Security Testing

In this coding session, fuzzing expert Josh Grant will demo how the integration of Jazzer.js into Jest enables a unified workflow for functional and security testing in JavaScript. All with the familiar look and feel of a unit test.

A Breach Makes You Stronger

There are two kinds of CISOs: pre-breach and post-breach. Pre-breach CISOs are overly focused on tools and thinking about investing in prevention technologies. They do this almost to the exclusion of thinking about recovery and timely restoration of services once something bad actually occurs. And something bad will happen; it’s not a matter of if, but when (and how often, I might add, so “breach cadence” seems a more suitable KPI than breach likelihood).

How an Automated Onboarding API Can Streamline Your Business Processes

Definition: Automated onboarding is a process designed and scripted before user onboarding. It is an entire user or customer onboarding process that doesn’t require real-time human interaction and is frequently supported by in-app messages and instructions that are specifically created to ensure a positive onboarding experience and, therefore, customer satisfaction.