MD5 hash generator

How to eliminate false positives in file integrity monitoring on WordPress

File integrity monitoring (FIM) allows you to quickly detect file changes on your WordPress site. It is an important part of securing a WordPress site and the way it works is very ...

Automatic for the SOC People: How Automation Can Quell Those Pesky False Positives

This post first appeared in Cyber Defense Magazine’s Decembe edition. As a newly hired cybersecurity analyst, you’re excited to start... The post Automatic for the SOC People: How Automation Can Quell Those ...

What’s New and Changing in the World of Vulnerability Management?

According to CIS, “Organizations that do not scan for vulnerabilities and proactively address discovered flaws face a significant likelihood of having their computer systems compromised.” While vulnerability management (VM) isn’t new, I’ve ...
Threat Forwarding Augments Threat Intelligence with Automated Triage and Categorization

Threat Forwarding Augments Threat Intelligence with Automated Triage and Categorization

Bromium customers have long had the option to securely transmit their proprietary threat data to Bromium analysts either manually or using our one-way Cloud Connector. Now, with Bromium Secure Platform 4.1.5, we've ...
AI-based network security FI

Network Security Solutions: Be Wary of the Hype Around AI

How many times have you seen a trailer for a new movie that makes it looks absolutely fabulous? Special effects, big name actors, promised plot twists. But then when you actually see ...
software asset management

6 Best Practices to Make the Most of Your Sandbox Proof of Concept

Any time you incorporate a major new component—such as a sandbox platform—into your security ecosystem, it’s important to do a rigorous, side-by-side evaluation of competing products to determine the best choice for ...
Security Boulevard
Combating W-2 Fraud

Combating W-2 Fraud, An Avalanche of False Positives and Wasted Time

Nobody likes tax season. Except perhaps the cybercriminals who are successfully scamming users into sharing their W-2 information. Year over year, the number of IRS-related phishing scams targeting individuals and companies continues ...
Security Boulevard