An Active Defense Mindset Draws Better Financial Returns from Your SOC

Sid Trivedi is a Partner at Foundation Capital and one of Respond Software’s key investors. As someone who is interested in technology and how it helps a business run better, he brings ...

The COVID-19 Crisis’s Impact on Security Operations: Automation Comes to the Fore

We’re living through historic times. The current crisis will almost certainly serve as a catalyst for numerous long-term changes in our communities, altering the ways we work, play, socialize, use technology, and ...

Modernizing Your SecOps for Stability, Resilience and Growth

Matt Eberhart recently hosted a webinar with Peter Schawacker, Principal at Blinktag Solutions, and Chris Calvert, VP Strategy/Founder Respond Software on how SOCs can react to the changing times we are all ...

Taking Stock: The Internet of Things, and Machine Learning Algorithms at War

Cybersecurity is adversarial in nature, hackers try to understand security mechanisms and how to bypass them ...

Explainer Series: What is Clickjacking?

Here we go, another online trap ready to ensnare unsuspecting – well, until now anyway – users. As if Phishing, Cryptojacking, credential stuffing and old school scamming wasn’t enough, folks really just ...
A Quick-Start Introduction to Database Security: An Operational Approach

A Quick-Start Introduction to Database Security: An Operational Approach

The recent SingHealth data breach incident exposed 1.5 million patients’ records. In the aftermath, the Cyber Security Agency of Singapore published a set of security measures aimed at improving the protection of ...

Imperva to Acquire DevOps Security Leader Prevoty

| | Perspective
Today, we announced that we entered into an agreement to acquire Prevoty, an innovator and leader in building application security that can block attacks and monitor interactions inside application stacks using DevOps ...
Drupal, Phishing and A New Cryptomining Botnet

Drupal, Phishing and A New Cryptomining Botnet

It’s a well-known fact that security solutions must quickly adapt to new attack methods. There are several ways to achieve this goal, regularly applying security patches and updates, relying on threat intelligence ...
The Trickster Hackers – Backdoor Obfuscation and Evasion Techniques

The Trickster Hackers – Backdoor Obfuscation and Evasion Techniques

A backdoor is a method for bypassing the normal authentication or encryption of a system. Sometimes developers construct backdoors to their own programs for various reasons. For example, to provide easy maintenance, ...
Optimizing A Monitoring System: Three Methods for Effective Incident Management

Optimizing A Monitoring System: Three Methods for Effective Incident Management

Picture this: You’ve just returned from a well-deserved vacation and, upon opening up your security monitoring system you’re faced with the prospect of analyzing thousands of events. This isn’t an imaginary scenario, ...