article thumbnail

RSAC insights: ‘SaaS security posture management’ — SSPM — has emerged as a networking must-have

The Last Watchdog

From Office 365 to Zoom to Salesforce.com, cloud-hosted software applications have come to make up the nerve center of daily business activity. I visited with Maor Bin, co-founder and CEO of Tel Aviv-based Adaptive Shield , a pioneer in a new security discipline referred to as SaaS Security Posture Management (SSPM.)

Security 229
article thumbnail

Black Hat insights: Generative AI begins seeping into the security platforms that will carry us forward

The Last Watchdog

I came away with a much better understanding of the disruption/transformation that is gaining momentum, with respect to privacy and cybersecurity. Huynh What’s more, generative AI has exacerbated the longstanding problem of well-intentioned employees unwittingly creating dangerous new exposures, especially in hybrid and multi-cloud networks.

Security 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US CISA published a guide to better use the MITRE ATT&CK framework

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) this week released a new guide for cyber threat intelligence experts on the use of the MITRE ATT&CK framework. In 2018, MITRE announced the MITRE ATT&CK , a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

article thumbnail

MY TAKE: Sophos X-Ops advances internal, external threat intelligence sharing to the next level

The Last Watchdog

Obama’s clarion call led to the passage of the Cybersecurity Information Sharing Act , the creation of Information Sharing and Analysis Organizations ( ISAOs ) and the jump-starting of several private-sector sharing consortiums. And the entire mitigation effort gets added to the overall knowledge base.

article thumbnail

What are Breach and Attack Simulations?

IBM Big Data Hub

Providers such as SafeBreach, XM Cyber, and Cymulate, offer cloud-based solutions which allow for the easy integration of BAS tools without implementing any new hardware. While not intended to replace other cybersecurity protocols, BAS solutions can significantly improve an organization’s security posture.

article thumbnail

How Hackers Evade Detection

eSecurity Planet

The MITRE ATT&CK framework is one of the best knowledge bases available, as it documents in detail how attackers behave and think. If you have no idea how to spot such sneaky moves, ATT&CK is a great resource, and even advanced teams use it daily, as many security vendors map the knowledge base to perform analysis.

Metadata 130
article thumbnail

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

Related: The ‘gamification’ of cybersecurity training. Frankly, a lot of companies got away with using analogue processes for years, and now they’re finally having to adopt the cloud and the Internet of Things. Stanger: We typically go in and talk to companies about guiding them down a whole cybersecurity pathway.

IT 133