Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Focus Terrapin patching efforts with Zeek

In this blog, we will demonstrate how Zeek’s metadata approach can help focus patching efforts related to the recent SSH “Terrapin” attack. One of the interesting aspects to bear in mind as you read this is that Zeek provides visibility of the vulnerable elements of this encrypted protocol, and thus serves as a reminder that network monitoring is still very much relevant, even in a heavily encrypted world.

Defender for Endpoint: Transforming Endpoint Security with Advanced Threat Protection

In an era where cyber threats are becoming increasingly sophisticated and pervasive, securing endpoints is paramount. Microsoft Defender for Endpoint emerges as a key player in the cybersecurity arena, offering comprehensive protection against a wide array of threats. This blog post delves into how Defender for Endpoint is revolutionizing endpoint security through the use of advanced threat protection technologies.

The Role of Document Assessment and Data Extraction in Modern ID Verification

In the modern digital landscape, the importance of document assessment and data extraction in ID verification processes cannot be overstated. These technologies are pivotal for businesses and organizations to ensure security, compliance, and efficient customer onboarding. With the rapid digitalization of services, from neobanks to telehealth, efficient and secure digital customer acquisition has become crucial.

Salt Security, API Posture Governance, and the NIST Cybersecurity Framework 2.0

Securing organizations against today’s most advanced threats continues to be challenging, with APIs (Application Programming Interfaces)playing an increasingly central and vulnerable role, especially as digital transformation marches on. The NIST Cybersecurity Framework 2.0 (CSF) release underscores the urgency of addressing evolving threats and now emphasizes the importance of governance in Cybersecurity.

What Are the Cybersecurity Risks of Remote Work?

Working remotely has allowed organizations to enhance their efficiency and provide employees with flexibility. However, remote work comes with cybersecurity risks that can often lead to data breaches and jeopardize an organization’s security. The five cybersecurity risks of remote work are using weak passwords, an insecure internet connection, unencrypted file sharing, an expanded attack surface and the use of personal devices.

Using the AWS CLI with Amazon Linux

Amazon Web Services (AWS) provides a wide array of cloud computing solutions. Mastering the AWS Command Line Interface (CLI) is an essential skill for developers, system administrators, and cloud engineers working within its ecosystem. Amazon Linux, an open source Linux distribution provided by AWS, is optimized for running on AWS infrastructure, making it a popular choice for cloud-based applications.

Microsoft 365 Backup: A Step-by-Step Guide with BDRSuite

BDRSuite for Microsoft 365 offers a comprehensive and cost-effective Office 365 backup solution to protect your Microsoft 365 data and ensure business continuity. BDRSuite provides seamless and automated backups of Microsoft 365 user data, flexible backup configuration options, multiple recovery options, and user-friendly interface.#microsoft #office365 #databackup #dataprotection #datarecovery #disasterrecovery.

FAQ: What is FIPS 140-2 and "Validated Cryptography"?

As time marches on and technology develops, there’s a constant push and pull between information security and attempts to breach that security. Obscurity – simply hiding from sight – isn’t enough with automated processes capable of scanning any possible address looking for signs of life, so much of modern computer security comes down to cryptography. Pretty much everyone has some experience with cryptography, from our childhood spy media to modern computer science.

Pioneering peer-to-peer boat sharing with GetMyBoat - Personally S02E01

Dive into the world of fintech with "Personally" by Persona, where we explore the innovative solutions driving today's startups. In this episode, Ed Giansante chats with Bryan Petro is the Chief Operating Officer (COO) of GetMyBoat, the world's largest boat rental & charter marketplace with over 150,000+ boats in 9,300 locations and 184 countries. He was the first employee at GetMyBoat starting in Product Management and Operations, having managed the Company's explosive growth into a globally distributed company across 8 countries (employees).