Security Orchestration is more than Automation
The Myth of the Unmanned SOC By Amos Stern, CEO, Siemplify It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal…
The IoT Boom and The Implications on Our Home Networks
By Domenico Crapanzano, is CEO of Fing Over the past year you have probably seen ‘Internet of Things’ (IoT) popping up all over the place, but what does this vague…
Software Forensics: Beyond the Law
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction Traditionally, the term “forensics” is the use of science to discover evidence of criminal activity. Extending this to software broadens the use…
The Trials and Errors of Security Operations Revealed in New Report
By Roberto Sandoval, Manager, WW SIOC Strategic Solutions & Enablement, HPE Security The security industry is going through a volatile period. Threat actors are becoming bolder and evolving quickly, and…
Six Reasons to Rethink Secure Remote Access
By Etay Bogner, VP, Zero-Trust Products, Proofpoint Whether you are the IT manager of a growing startup company or a midsize enterprise, you have probably already faced the increasing demand…
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your…
High Schools Are Not Exempt From Attack
San Diego USD By Charles Parker, II; Cybersecurity Lab Engineer High schools are much like universities and colleges, in that these hold a mass amount of data which may easily…
Investing In SIEM: How Your Business Can Improve Threat Detection and Response
By Chester Avey, Cyber Security Specialist, Independent. Despite continual advancements in security technologies to protect businesses from cyber threats, there remains no silver bullet to completely prevent breaches. And that’s…
Configuration Mistakes That Provide Field Days for Hackers
By Tim Bandos, Vice President of Cybersecurity at Digital Guardian Sometimes it’s the little things. In hindsight, more often than not, getting hacked can stem from a minor misstep or…
HiddenWasp and the Emergence of Linux-based Threats
By Intezer The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new…
Still Misconfiguring Servers…
Addressing the Addressable By Charles Parker, II; Cybersecurity Lab Engineer When academics and students are writing papers, research is required. The research not only focused on the germane topic, however,…
Security in Orbit: Addressing the Current State of Satellite Security
By Geoff Pierce, Chief Information Security Officer, Centauri With 5G finally starting to roll out across the country, the anticipation for new IoT applications continues to build. With that anticipation…