| Oct 30, 2020 3 Scary Stories of Data Breach Disasters 3 data breach stories that could happen to any company and that could've been preventable.
| Oct 27, 2020 TeamTNT Attacks Cloud Environments TeamTNT attacks cloud environments with Weave Scope. This report describes the tactics, techniques, and procedures used and how to defend against them.
| Oct 27, 2020 What Is Security Orchestration, Automation and Response (SOAR)? Security orchestration, automation, and response (SOAR) automates and accelerates security operations, analytics and reporting.
| Oct 22, 2020 We have an MDR...do we still need a SIEM? Explains what MDR and SIEM are, and how they can work together to provide you with a superior cybersecurity solution.
| Oct 20, 2020 Culture of Collaboration: Fanatical Testing and Instrumentation We can use this idea to develop organizational controls and processes to prevent, detect, respond to and recover from cyber-attacks.
| Oct 20, 2020 Translating Paper into Trust Edward Vasko explains how collaboration can lead to security controls tailored to minimize their impact on job performance.
| Oct 20, 2020 Why (and How) Company Leadership should create a culture of Security Collaboration The goal is to balance security risks against business objectives and develop sensible controls that reduce the biggest risks with minimal impact on job performance.
| Oct 20, 2020 Understanding Personal Data Privacy Compliance Obligations to protect your customers, partners and employees Due to the many personal data privacy compliance requirements and non-compliance sanctions, organizations should understand regulations.
| Oct 19, 2020 SonicWall Vulnerability may allow denial of service attack This is a threat report about a critical SonicWall vulnerability tracked as CVE-2020-5135 that can allow a Denial of Service attack.
| Oct 15, 2020 What Is Extended Detection and Response (XDR) and why is it gaining momentum as a security solution? Learn what extended detection and response is and how XDR is evolving into the successor to end-point detection and response (EDR) solutions.