The RSA Security Conference is back, taking place in San Francisco, California on June 6-9. Yay, RSA is back, but it feels strange to have it in the summer. You might remember it was slated to be held in person for the first time in two years in February…
At Fortify , we have an incredibly talented and diverse team. We hope you join us in taking the opportunity to get to know different members from all over our organization through the Fortify Employee Spotlight series. This spotlight is highlighting Giuseppe…
Earlier this year, cybersecurity firm CardinalOps published their 2022 Report on the State of SIEM Detection Risk . CardinalOps, who operate a cloud-based AI analytics platform that continuously audits SIEM/XDR/EDR solutions to detect and eliminate MITRE…
Every year, I get most excited about the RSA Security Conference , this year held April 24-27 in San Francisco. Of course, I also get excited this time of the year to write a blog that tells the viewers about what’s new with our cybersecurity solutions…
On paper, the idea of SOAR, Security Orchestration Automation and Response, sounds great. We read all the time about the challenges faced by Security Operation Centers, whether in the press, on vendor web sites or in the introductory slides of a customer…
We are excited to announce that Micro Focus has been recognized as a Visionary in the 2022 Gartner® Magic Quadrant TM for Security Information and Event Management , with our product solution CyberRes ArcSight having been evaluated.
Micro Focus was…
Interset can generate a list of your riskiest users just by analyzing the data that routinely flows through your organization. Compiling a list like this would normally take security analysts a tremendous amount of effort and time. Keeping that list updated…
We are coming up on two years since the Colonial Pipeline cyber breach . That cyberattack was a direct shot at the U.S. energy system and could be considered one of the most consequential cyberattacks in history. As we reviewed in our podcast episode…
Analysis of the sample that hit the Kudankulam Nuclear Power PlantSecurity Affairs
Expert Marco Ramilli and his team analyzed the sample that infected systems at the Kudankulam Nuclear Power Plant, it is a targeted attack. During the past few days a…
Consumer devices offer the best vehicle in bringing non-password based authentication mechanisms to the mainstream much the same way social networks have brought identity federation to the masses . It is the best shot we have of eventually killing passwords…