Reducing Investigation Time: How to Quickly Parse True Positives

Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for ...
Disrupting an Attacker from Exploiting Domain Credentials

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have found that top threat actors can go in and out of networks ...
Conditional Access Establishes Trust In the Network

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing ...
74% of Americans Are Clueless about Facebook’s Data Collection Algorithm, Survey Says

74% of Americans Are Clueless about Facebook’s Data Collection Algorithm, Survey Says

Americans don’t know much about Facebook and how its algorithm works, according to a survey from Pew Research Center conducted on 963 US Facebook users. The new study found that 74 percent ...
Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Deck the hall with sad employees, Fa, la, la, la, la, la, la, la, la! 'Tis the season to be swindled, Fa, la, la, la, la, la, la, la, la! ...
Going on the Offense: How to Eliminate Internal Threats

Going on the Offense: How to Eliminate Internal Threats

Over the past few years, we’ve observed significant changes in the types of conversations we’re having with CISOs. What used to be discussions about how to keep bad guys out has evolved ...
Simplifying PCI DSS 3.2 Compliance with Preempt

Simplifying PCI DSS 3.2 Compliance with Preempt

If your organization handles credit cards, you are no doubt familiar with Payment Card Industry Data Security Standard (PCI DSS) compliance. PCI DSS is a set of requirements and procedures that have ...
2483.png

The Joy of Tech®, ‘All We Are Is Dust In The Algorithm’

Via the non-trackable observations of Nitrozac and Snaggy at The Joy of Tech®' Permalink ...
Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

I’ve heard it many times from customers: “IT Security needs to be transparent to users in order to be successful.” Unfortunately, we are now in a digital age where things have dramatically ...