Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to execute an Azure Cloud purple team exercise

For folks who are responsible for threat detection of any kind for their organizations, the cloud can often be a difficult area to approach. At the time of writing, Amazon Web Services contains over two hundred services, while the Azure cloud offers six hundred. Each of these services can generate unique telemetry and each surface can present defenders with a unique attack path to handle. Adding to this complexity is the diversity of cloud workload configurations, as well as varying architecture models.

BMO Bank Loses Customer Data in Recent Data Breach Attack

BMO Bank is the 8th largest bank in the United States, employing over 12,000 individuals. The bank manages more than $3 Billion in annual reserves and works with a huge number of customers as it has over 1,000 physical locations across the country. BMO Bank is based in Chicago, Illinois, but has locations throughout the country. If you bank with BMO, your data may be at risk, because the organization was recently hacked and lost a significant amount of customer data.

Qualitative vs. Quantitative Cybersecurity Risk Assessment

Risk mitigation is at the heart of cybersecurity. By connecting to the Internet, implementing upgraded IT systems, or adding a new vendor to your organization, you are automatically exposing your business to some level of cyber risk. With outsourcing on the rise and a growing reliance on vendors who are processing, storing, and transmitting sensitive data, assessing and mitigating risk is becoming increasingly important.

Enabling Workload-Level Security for Kubernetes with Checkpoint Firewall and Calico Egress Gateway

Enterprises implementing containers and Kubernetes in either corporate datacenters or cloud environments typically employ Checkpoint Quantum to secure traffic between their datacenter networks and Checkpoint CloudGuard to safeguard their cloud resources. Often these network security perimeter focused solutions are also used to scrutinize traffic originating from Kubernetes clusters.

Cognitive Fitness: Cybersecurity Perspective on Complex VUCA Environments

Cybersecurity is a dynamic, ever-evolving space where traditional approaches often fall short. To thrive in this environment, one must cultivate the ability to think differently and harness cognitive skills to a higher degree than in many other fields. Bec McKeown emphasizes cognitive fitness through the lens of the cybersecurity realm's complex VUCA (Volatility, Uncertainty, Complexity, Ambiguity) environment.

Coffee Talk with SURGe: 2023-OCT-03 WS_FTP RCE, Exim Scope, ChatGPT, Cybersecurity Awareness Month

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share the pros and cons of Cybersecurity Awareness Month.

Shira Rubinoff at Blackhat with Israel Mazin, CEO and Chairman of Memcyco

Amidst the electric atmosphere of the Black Hat conference, where cybersecurity luminaries converge to explore cutting-edge innovations, a spotlight shone on Memcyco's CEO, Israel Mazin. In a recent interview captured on film, Israel Mazin engaged in a dialogue with tech influencer and member of our advisory board, Shira Rubinoff. Together, they delved deep into Memcyco's paradigm-shifting product solutions that are challenging the status quo of the threat intelligence landscape.