Supply chain attacks have become a growing trend in the security world. Attackers are exploiting the trust users have in acclaimed software companies to implant malware into systems. It often results in mass-scale outreach attacks and goes undetected
Blog (975)
Key Takeaways (Summary by Anton Chuvakin):
- SOC is first a TEAM. Next a PROCESS. And it uses TECHNOLOGY too, but ultimately people and process defines SOC success
- Key challenges in building a modern SOC include (1) gaining visibility with the expa
This Google talk helps us understand which are the main areas to look first in and create a process to prevent account compromise. Once compromised, it is much harder to stop access.
About Speaker
Elie Bursztein leads the anti-abuse research team a
As enterprises battle to conquer the new normal, an old concept of ‘Zero Trust’ has come to the fore. What is zero trust and how pertinent is it for the situation that businesses find themselves? What is the right approach to implement this framework
Creating a long-term plan and introducing new features and products are only one part of the job, for product teams. However, the work doesn’t end even after delivering the products to the customers. You have the responsibility of tracking the bugs a
In a recent report from Gartner, External Attack Surface Management (EASM) has been highlighted as a major category in cybersecurity. According to Gartner, EASM is an emerging product set that supports organizations in identifying risks coming fro
Now, we all agree that various cloud technologies such as SaaS SIEM help your Security Operations Center (SOC). However, there’s also a need to talk about how traditional SOCs are challenged by the need to monitor cloud computing environments for thr
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
