-
7 Requirements for a Successful XDR Strategy
7 Requirements for a Successful XDR Strategy Cybereason Blog – Dan Verton REQUIREMENT 1: COMPREHENSIVE VISIBILITY REQUIREMENT 2: THREAT INTELLIGENCE REQUIREMENT 3: ANALYTICS AND AUTOMATION […]
-
Mattermost Launches New ServiceNow and GitLab Integrations
Mattermost Launches New ServiceNow and GitLab Integrations AI Tech Park – Globe Newswire Incident escalation workflows with ServiceNow and GitLab are built on Mattermostâs flexible, […]
-
Hackers abuse legitimate remote monitoring and management tools in attacks
Hackers abuse legitimate remote monitoring and management tools in attacks CSO Online – Lucian Constantin Researchers from Cisco Talos reported this week that one particular […]
-
What your SOC will be facing in 2023
What your SOC will be facing in 2023 Secure List – Sergey Soldatov, Roman Nazarov (Kaspersky) he first part of this report is devoted to […]
-
ThreatModeler Introduced a Unique Threat Model Marketplace
ThreatModeler Introduced a Unique Threat Model Marketplace IT Cloud Demand – Demandtalk ThreatModeler planned to introduce 50 new threat models every month to address industry […]
-
Cybercriminals Exploiting HR Policy Announcements in Phishing Attacks
Cybercriminals Exploiting HR Policy Announcements in Phishing Attacks Secure World – Drew Todd Cybercriminals are posing as HR officials and sending phishing emails that contain […]
-
ThreatConnect Extends Industry Leading Threat Intelligence Platform to Enable Threat Intelligence Operations (TI Ops)
ThreatConnect Extends Industry Leading Threat Intelligence Platform to Enable Threat Intelligence Operations (TI Ops) Business Insider ARLINGTON, Va., Jan. 25, 2023 /PRNewswire/ — ThreatConnect announced […]
-
Why data loss prevention (DLP) matters in a zero-trust world
Why data loss prevention (DLP) matters in a zero-trust world Venture Beat One weakness of legacy DLP is interestingly the greatest strength the enterprises need […]
-
Uncovering Other DarkTortilla Threat Vectors
Uncovering Other DarkTortilla Threat Vectors Circle ID – Whoisxml API Cyble Research and Intelligence Labs (CRIL) published a technical analysis of the threat specifically targeting […]
-
5 Things SecOps Can Learn from Dungeons & Dragons
5 Things SecOps Can Learn from Dungeons & Dragons Tech Beacon – Rik Ferguson Anyone who has ever experienced a SOC 2 or ISO 27001 […]
Categories
- AI / ML
- AIOps
- IT/OT News
- Open Source
- Security Industry News
- Security Strategy News
- SOC News
- Zero Trust
Recent Posts
- Cybersecurity Threat Landscape and 2026 Outlook
- Cyber Resilience and Software Escrow
- AI & Humans: Making the Relationship Work – Schneier on Security
- How AI is Streamlining the Underwriting Process for the Insurance Industry