Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JUMPSEC Summer Industry Briefing Benchmarking EDR/MDR solutions

Benchmarking EDR/MDR Solutions presented by Tom Ellson, Head of Offensive Security We recently completed a review of a number of industry-recognised EDR and MDR solutions. This led us to take a novel approach that addresses many of the limitations and constraints typically met when undertaking this type of assessment. You will learn why context is key to threat detection, and how the different vendors performed in our realistic and representative environment against goal-focused attack paths.

JUMPSEC Summer Industry Briefing UK Threat Landscape Trends

UK Threat Landscape Trends - Presented by John Fitzpatrick, CTO John Fitzpatrick reflects on the last six months, examining the key threats and trends we have observed affecting UK institutions. Specifically, we will delve into ransomware threat evolution, presenting and discussing. This will build upon our predictions made at the last briefing, reviewing how the landscape has changed, how our predictions fared, and how it has been influenced by major cyber security events and developments.

JUMPSEC Summer Industry Briefing Understanding your Attack Surface

Understanding Your “Attack Surface” presented by Max Garaffa Attackers can access a huge amount of open-source information about your organisation over the internet. You will learn how to locate this information, understand what is most dangerous, and what you can do to counter the threat. This intelligence can be used for both offence and defence, which we have explored in recent engagements for our clients.

AI-Based Planning? You Might Want To Double-Check That Data.

AI is awesome! It can do so much for us, much faster and broader than we can do ourselves. All of AI’s benefits are great, assuming the data is trustworthy. Sure, algorithms can detect and remove outliers, but what if your corrupt data does not reside in the outliers? You can only trust the data when you establish trust at the source of the data. How often have we been conversing with a friend who is relaying information from their friend?

Why Ignorance Isn't Bliss in IoT

Why You Need a Credential Manager For Your Devices Before joining Device Authority, I gave my home IoT security exposure very little thought, and I continued to add to it. Now, I have a plethora of devices in my home including, Smart appliances, Wi-Fi lights and sockets, wireless security video, and Wi-Fi-enabled active home power monitoring, to name a few.

Bugcrowd Taps Top Hackers for Live Hacking Event with Indeed at 2022 Black Hat Conference

Bugcrowd, the leader in crowdsourced cybersecurity, announced a live hacking event to test business-critical attack surface and mobile applications for Indeed.com, during the 2022 Black Hat USA and DEF CON cybersecurity conferences in Las Vegas.

ManageEngine has been recognized once again in the Gartner Magic Quadrant for Unified Endpoint Management

We’re delighted to announce that ManageEngine has been recognized among five other vendors in 2022 Gartner Magic Quadrant for Unified Endpoint Management. Vendors were evaluated based on their ability to execute and completeness of vision. This recognition comes after IDC naming us a Leader in the IDC MarketScape reports for UEM tools.

3 Types of Network Attacks to Watch Out For

Cybersecurity is becoming more of a common term in today’s industry. It is being passed around executive meetings along with financial information and projected marketing strategies. Within the cybersecurity lexicon, there are some attack methods that are repeated enough to become part of a “common tongue”. These terms are infrastructure agnostic; it does not really matter the infrastructure type you have.