Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A Smarter Approach to Managing Security Services: The SecOps Cloud Platform (w/ MSSP Alert)

As an MSSP or MDR, your success hinges on the quality of your services and growing your customer base - not on managing infrastructure or worrying about uptime. Join us as we look at how LimaCharlie's SecOps Cloud Platform efficiently handles infrastructure, allowing you to focus on service, innovation and delivery. We'll explore how LimaCharlie's flexible, vendor-agnostic platform.

From Confidence to Competence: Overcoming Secrets Management Challenges

Check out this insightful discussion on the realities of secrets management, featuring Grace Law, Principal Security Engineer in Application Security at a large insurance company, and Chris Smith, Product Marketing Director for Machine Identities & DevSecOps at CyberArk. Together, they’ll share real-world experiences and strategies for overcoming the most pressing challenges in secrets management and security.

Security Bulletin: PAN-OS Authentication Bypass and Privilege Escalation Vulnerabilities

On November 19, 2024, Palo Alto Networks disclosed two critical vulnerabilities in its PAN-OS software, CVE-2024-0012 an Authentication Bypas, and CVE-2024-9474 a Privilege Escalation. These vulnerabilities enable attackers to gain unauthorized administrative access and escalate privileges to root level. Exploitation of these vulnerabilities, observed in the wild, has been attributed to a targeted campaign dubbed Operation Lunar Peek.

How to Combat Alert Fatigue to Retain and Empower Your Security Teams

In the high-stakes world of cybersecurity, organizations must ensure that their teams not only protect the organization but also stay motivated and productive. One of the most insidious threats to achieving this goal is alert fatigue. When analysts are bombarded with thousands of security alerts daily, they risk becoming overwhelmed and disillusioned in their roles.

Water Barghest: A Stark Reminder of IoT Security Gaps

Trend Micro’s recent report on the Water Barghest threat actor underlines a critical issue that has long plagued the IoT ecosystem: the security shortcomings inherent in many connected devices. With over 20,000 IoT devices compromised and exploited as residential proxies within minutes, this story highlights the growing risks posed by insecure IoT devices and the urgent need for proactive security measures.

[Live streaming] Microsoft 365 Cloud Backup: Overcoming Native Data Protection Limitations

Microsoft 365 remains the backbone of many businesses, essential to their daily operations and success. Yet, this reliance exposes a critical gap – how to protect the data it holds and who’s responsible for its protection. Potential threats to Microsoft 365 data vary from everyday mishaps like accidental deletion to malicious attacks like ransomware. The bottom line is that it’s time to rethink your approach to Microsoft 365 data protection and recovery.

Tanium Ask - AI-Powered Question Bar - Tanium Tech Talks #111

Tanium Ask is an artificial intelligence (AI)-powered, natural language question bar that enables users to easily and rapidly query for real-time information about their environment. Leveraging industry-leading large language models, Tanium Ask can translate unstructured text input into high-fidelity queries with precise sensor and targeting parameters.

Arctic Wolf Observes Threat Campaign Targeting Palo Alto Networks Firewall Devices

On November 18, 2024, Palo Alto Networks disclosed the existence of two vulnerabilities (CVE-2024-0012 and CVE-2024-9474) in Palo Alto Networks OS (PAN-OS), the operating system used on their firewall devices. A day later, watchTowr released a report providing technical details on how to chain the two vulnerabilities together to achieve remote code execution of these vulnerabilities.