Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Hunting vs. Threat Detecting: Two Approaches to Finding & Mitigating Threats

Threat hunting and detection are two major prevention strategies in modern cybersecurity systems. Both strategies help identify potential threats to the organizations — though they take different approaches to threat identification. This article explains the difference between threat hunting and detection, so you know what to focus on for your organization’s cybersecurity strategy.

I Am Suing You! Legal Threats in Phishing Emails

Unless you’ve been avoiding your inbox like a cybercriminal avoids sunlight, you’ve probably seen something like this before: That right there is a classic example of a phishing email. Most security-aware individuals can spot a phishing email from a mile away. In the past, it used to be the misspellings, such as in this email, that gave it away. Now, misspellings and poor grammar aren’t ideal indicators of phishing attempts.

Most Common HECVAT Violations (And How to Avoid Them)

The HECVAT (Higher Education Community Vendor Assessment Toolkit) was developed by the Higher Education Information Security Council (HEISC) as an initiative to help higher education institutions better protect their data, prevent the risk of data breaches, and measure the cyber risk of third-party solution providers.

Random but Memorable - Episode 10.2: Passwordless Future Chatbot Optimism with Andrew Shikiar

Goodbye, passwords. 👋 On the show today, we chat with Andrew Shikiar from FIDO Alliance to get the lowdown on all things passwordless and what it means for the future of authentication. In Watchtower Weekly, we discuss the hilarious but scary capabilities of a chatbot (aka ChatGPT) as well as a recent Reddit data breach. We also welcome back 1Password founder, Sara Teare, who is joining us as a new host! 🎉🎙

The 443 Episode 230 - Successfully Prosecuting a Russian Hacker

On today's episode, we discuss a recent court case resulting in the succesful conviction of a Russian national tied to breaking in to several publicly traded US companies. We also cover the latest details on the ESXiArgs ransomware attacks that have been impacting organizations globally as well as the latest CISA alert on nation-state ransomware activity. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

2023 North America Security Trends: Staying Ahead of Modern-Day Risks

In this video, Matthew Dumpert, Managing Director and Head of Kroll’s North America Security Risk Management practice, discusses current security trends in North America and what organizations should expect this year in terms of risk, safety and security. He also explains why it’s more important than ever that companies review their business continuity and threat management plans to ensure they are equipped for the expected increase in workplace violence, theft and safety issues.

The CISO's Guide to Application Security Innovation

Threat actors operate by an ironclad rule: If it’s important to businesses, it’s important to them. And they certainly understand the crucial business role of applications. Applications are now the number one attack vector, while software supply chain attacks increased 650 percent in a year. Clearly, if you don’t already have a modern application security program, you need to build one. But how do you make sure that your program will be effective?

Intelligent Recovery with Trilios Continuous Restore

New Innovation Enables Data-Driven Organizations to Access ‘Single-Source-of-Truth’ Data from Multiple, Heterogeneous Clouds Simultaneously. Trilio’s Continuous Restore capability enables migration and replication of stateful applications in seconds or minutes so that all companies can protect and use their data anywhere, from core to edge—regardless of what the application runs on or where the data is stored.