5 cybersecurity predictions for 2023

5 cybersecurity predictions for 2023

5 cybersecurity predictions for 2023 The cyber game is now an entire underground economy wrapped around cyberattacks. Thanks to increased international friction and the activity of groups such as Lapsus$, cybercriminals have ...
Introducing the book: The Security Analyst’s Guide to Suricata

Introducing the book: The Security Analyst’s Guide to Suricata

Introducing the book: The Security Analyst’s Guide to Suricata In this Help Net Security video interview, Eric Leblond, CTO at Stamus Networks, talks about The Security Analyst’s Guide to Suricata, a book ...
Overcoming unique cybersecurity challenges in schools

Overcoming unique cybersecurity challenges in schools

Overcoming unique cybersecurity challenges in schools A school’s ecosystem is far different from that of the typical enterprise. Not only does a school district face the monumental task of educating our upcoming ...
New infosec products of the week: November 25, 2022

New infosec products of the week: November 25, 2022

New infosec products of the week: November 25, 2022 Here’s a look at the most interesting products from the past week, featuring releases from Solvo, Sonrai Security, and Spring Labs. Sonrai Risk ...
OneTrust partners with ECI to help companies evaluate their ethics and compliance programs

OneTrust partners with ECI to help companies evaluate their ethics and compliance programs

OneTrust partners with ECI to help companies evaluate their ethics and compliance programs OneTrust is partnering with the Ethics & Compliance Initiative (ECI), the global non-profit organization that empowers organizations to build ...
Malwarebytes collaborates with Stellar Cyber to increase productivity and efficiency of security teams

Malwarebytes collaborates with Stellar Cyber to increase productivity and efficiency of security teams

Malwarebytes collaborates with Stellar Cyber to increase productivity and efficiency of security teams Malwarebytes partners with Stellar Cyber to help resource-constrained teams produce consistent security outcomes across all environments; on-premises, cloud and ...
Sonrai Risk Insights Engine empowers security teams to reduce impact of exploits

Sonrai Risk Insights Engine empowers security teams to reduce impact of exploits

Sonrai Risk Insights Engine empowers security teams to reduce impact of exploits Sonrai Security releases Risk Insights Engine which lets developer and security teams control the chaos in both their organizations and ...
Threat actors extend attack techniques to new enterprise apps and services

Threat actors extend attack techniques to new enterprise apps and services

Threat actors extend attack techniques to new enterprise apps and services Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which ...
Here’s how to make sure your incident response strategy is ready for holiday hackers

Here’s how to make sure your incident response strategy is ready for holiday hackers

Here’s how to make sure your incident response strategy is ready for holiday hackers The best line of defense against holiday hacking schemes is a comprehensive incident response strategy that focuses on ...
Best practices for implementing a company-wide risk analysis program

Best practices for implementing a company-wide risk analysis program

Best practices for implementing a company-wide risk analysis program For most organizations today, the threat surface is broad and getting broader. There are the obvious concerns like the user base, remote or ...