Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Improve your SecOps with Priam Cyber AI's AVA: an AI-driven Virtual Analyst

LimaCharlie is the SecOps Cloud Platform that allows security teams of all shapes and sizes to build the program they need, while not having to worry about scale and infrastructure woes. As a platform that fosters creation, we also encourage our users to develop their own extensions, services, and capabilities. Priam Cyber AI has done just that with AVA, a platform geared towards measuring and improving your security operations.

Unlocking the Full Financial and Technical Value of SASE

The world we inherited from legacy network and security vendors has led to architectures suffering from excessive complexity and costs while making life difficult for administrators and end users alike. Platform convergence aligns the most important networking and security controls, enabling organizations to consolidate vendors and achieve significant cost savings.

Cisco's Zero-Day Vulnerability (CVE-2023-20198)

Cisco has released a Product Security Incident Response Team (PSIRT) advisory regarding a zero-day vulnerability in the web UI feature of Cisco IOS XE software. Cisco has stated that the web-based user interface should never be accessible through the public internet, yet research indicates that more than 10,000 Cisco devices have been exploited by an unknown threat actor. This critical vulnerability is being tracked as CVE-2023-20198 and is currently undergoing investigation for active exploitation.

Cybersecurity Sessions S02E06: Privacy & ChatGPT, Credential Stuffing 23andMe, Freebie Bots

To start this month’s episode, we once again weigh in on AI – this time considering the privacy implications when feeding prompts into generative AI tools like ChatGPT and Bard. We’ll discuss whether it’s safe to share company IP or your own personal information into such tools, before hearing how we approach this at Netacea from Principal Software Engineer John Beech.

How To Secure Remote Desktop Protocol

Remote work has increased the usage of Remote Desktop Protocol. However, Remote Desktop Protocol connections can have many vulnerabilities if not properly secured. The best way to secure Remote Desktop Protocol connections is by creating strong login credentials and using a secure network. This will help protect your company from cyberattacks that could compromise sensitive data.

Another Medical Information Breach Out of Chicago, Notifications Begin

Chicago’s health providers are prime targets for opportunistic hackers; Cook County Health is the most recently discovered victim of a cyber assault. Assailants took advantage of a third-party medical transcription service Perry Johnson & Associates, Inc. (PJ&A) provided. The attack targeted PJ&A’s systems, resulting in the exposure of numerous patient records. If hackers accessed your information during the breach, there’s still time to protect yourself.

Getting started with procurement

If you’re part of a startup or small company and haven’t thought about procurement just yet, chances are that you should. Procurement is the method by which businesses discover, review, and purchase goods or services from an external source. While larger companies may have dedicated procurement teams, it’s important for small businesses to understand the process and consider their approach to avoid challenges down the line. ‍

Indigov's security team uses Datadog Cloud SIEM & Log Management to reduce mean time to respond

Watch this video to learn about how Indigov’s Security team (that runs their SOC, compliance program, and operations to support developers throughout the software development lifecycle) has deemed Cloud SIEM as one of the easiest and most integrated platforms to drive down response time from hours to minutes. Datadog Log Management has helped Indigov centralize all disparate data into one spot and Datadog Cloud SIEM’s out of the box detection rules and workflows have helped to capture their incident response process–driving response time down from hours to minutes!

A Deep Dive Into Security Testing

With the average cost of a data breach now at $4.35 million, it’s time for organizations to take proactive measures to protect themselves against cyber threats. By conducting thorough security testing, organizations can gain a deeper understanding of their security posture and make informed decisions about where to allocate their resources to improve their overall cybersecurity readiness.

The easiest ways to create, test and deploy security policies for EKS clusters

Amazon’s Elastic Kubernetes Service (EKS) is a popular managed Kubernetes option that allows customers to benefit from both an offloaded Kubernetes management plane, and the wide range of services that AWS offers. Managed or unmanaged, securing cluster traffic is always critical and, although AWS Security Groups can secure the cluster nodes, securing pod traffic requires something closer to the application data-path.