Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UTMStack Unveils Commercial License for its Correlation Engine and SDK: A Boon for Organizations Developing SIEM or XDR Solutions

In a significant move to empower organizations in bolstering their security infrastructure, UTMstack has announced the commercialization of its Correlation Engine and Software Development Kit (SDK) under a commercial license. This strategic initiative paves the way for organizations aiming to develop their own Security Information and Event Management (SIEM) or Extended Detection and Response (XDR) solutions by leveraging the state-of-the-art features embedded in the UTMstack’s platform.

Detecting Network-Based Anomalies with Calico

In the vast digital landscape, the flow of data across networks is akin to water coursing through a city’s plumbing system. Just as impurities in water can signal potential issues, deviations in network traffic, termed as network inserted anomalies, can hint at cyber threats. These anomalies range from overt signs like unauthorized access attempts to subtler indicators like unusual data transfer patterns.

Demystifying Deep Learning: Unraveling the Brain-Inspired Evolution of AI || Razorthorn Security

Dive deep into the world of artificial intelligence with our latest video, "Unlocking the Power of Deep Learning: Exploring the Brain-Inspired Revolution in Machine Learning." In this comprehensive exploration, we'll unravel the fascinating concept of deep learning, a subset of machine learning, and understand how it's attempting to simulate the complexity of the human brain.

Protecting Users from Malicious Sites with Falcon for Mobile

Today, mobile devices are ubiquitous within enterprise environments. But with their proliferation, it provides adversaries with yet another attack surface with which they can target users and cause a breach. From phishing attacks to malicious apps, mobile users tend to let their guard down and potentially click on obfuscated links to malicious sites. Falcon for Mobile protects users by preventing connections to malicious sites on both iOS and Android devices.

Top Asian/APAC Cybersecurity Threats of 2023

When it comes to cybersecurity in Asia today, some of the key threats that organizations face – like ransomware and phishing – are consistent risks that all cybersecurity teams are surely familiar with. But others are more fluid and may evolve rapidly. Cyberattacks related to hacktivism, for example, are a growing threat in the APAC region, and generative AI technology is also impacting Asia cybersecurity challenges in novel ways.

Third-Party Security Risks: How to Mitigate Potential Cybersecurity Threats

Cooperation is the key to success, so working with third parties helps your organization increase efficiency, offer better products and services, employ highly qualified experts, and cut costs. But all these benefits come at the price of additional cybersecurity risks. Minor flaws in your third-party vendor’s security and privacy routines may lead to a breach in your organization’s cybersecurity.

The Use Of AI In Cybersecurity - Consultants Roundtable || Razorthorn Security

Hello, and welcome to Razorwire. This week, I've had a great time discussing the fascinating topic of artificial intelligence (AI) and its potential impact on our industry, with my esteemed Razorthorn consultants, Tom, Jamie and Michael. We explore the different types of AI, including machine learning and chatbots, and discuss the challenges of achieving a low false positive rate and high general application. You'll gain valuable insights into the evolution of AI and why we MUST take seriously the very real potential for malicious actors to use it for nefarious purposes.