Perspective
To XDR or Not to XDR – A Fireside Chat
Jackie Groark, VP of Security and CISO of Veristor, joined our Chief Customer Officer, Chris Triolo to answer questions for a discussion on the hottest emerging technology trend in cybersecurity, XDR. Here ...
An Active Defense Mindset Draws Better Financial Returns from Your SOC
Sid Trivedi is a Partner at Foundation Capital and one of Respond Software’s key investors. As someone who is interested in technology and how it helps a business run better, he brings ...
The COVID-19 Crisis’s Impact on Security Operations: Automation Comes to the Fore
We’re living through historic times. The current crisis will almost certainly serve as a catalyst for numerous long-term changes in our communities, altering the ways we work, play, socialize, use technology, and ...
Modernizing Your SecOps for Stability, Resilience and Growth
Matt Eberhart recently hosted a webinar with Peter Schawacker, Principal at Blinktag Solutions, and Chris Calvert, VP Strategy/Founder Respond Software on how SOCs can react to the changing times we are all ...
Taking Stock: The Internet of Things, and Machine Learning Algorithms at War
Cybersecurity is adversarial in nature, hackers try to understand security mechanisms and how to bypass them ...
Explainer Series: What is Clickjacking?
Here we go, another online trap ready to ensnare unsuspecting – well, until now anyway – users. As if Phishing, Cryptojacking, credential stuffing and old school scamming wasn’t enough, folks really just ...
A Quick-Start Introduction to Database Security: An Operational Approach
The recent SingHealth data breach incident exposed 1.5 million patients’ records. In the aftermath, the Cyber Security Agency of Singapore published a set of security measures aimed at improving the protection of ...
Imperva to Acquire DevOps Security Leader Prevoty
Today, we announced that we entered into an agreement to acquire Prevoty, an innovator and leader in building application security that can block attacks and monitor interactions inside application stacks using DevOps ...
Drupal, Phishing and A New Cryptomining Botnet
It’s a well-known fact that security solutions must quickly adapt to new attack methods. There are several ways to achieve this goal, regularly applying security patches and updates, relying on threat intelligence ...
The Trickster Hackers – Backdoor Obfuscation and Evasion Techniques
A backdoor is a method for bypassing the normal authentication or encryption of a system. Sometimes developers construct backdoors to their own programs for various reasons. For example, to provide easy maintenance, ...