Beyond Detection: Enhancing Your Security Posture with Predictive Cyberthreat Insights

The goal of cybersecurity is not just to respond to today’s threats but to anticipate tomorrow’s challenges. I recently had an enlightening conversation with Christopher Budd, Director of Sophos X-Ops Intelligence, to ...
Phishing triage workflow in Smart SOAR

How to Build a Phishing Playbook Part 3: Playbook Development

Welcome the third part of our series on how to build an automated incident response playbook for phishing threats inside of Smart SOAR. In this part, we will be transferring our rough ...
materiality privacy GRU

Getting Ahead of Cybersecurity Materiality Mayhem

Cybersecurity leaders must differentiate between strategic (material) and tactical threats in a cross-functional manner and determine 'materiality.' ...
Security Boulevard
collaboration telecom, threat actors

Does Your Security Team Need a Dedicated Collaboration Tool?

Investing in an IT- and/or security-specific collaboration platform ensures your team has tools that align with their IT and security requirements ...
Security Boulevard
FTC ai data privacy

2023 Sees Record Data Compromises Amidst Changing Tactics

Cybercriminals are shifting their focus toward targeted identity fraud and scams resulting in fewer overall victims ...
Security Boulevard
BFSI card, contactless banking FinCEN

How to Enrich Data for Fraud Reduction, Risk Management and Mitigation in BFSI

BFSI organizations are increasingly relying on data products to enrich data and enhance fraud reduction and risk management strategies ...
Security Boulevard
SecOps DevSecOps Makes a Difference, but Uptake is Slow

Two Practical Examples of Modern Cloud SecOps

These two examples of of core principles should help any SecOps team improve their cloud security operations.  ...
Security Boulevard
out-of-band Oklahoma Securities Commission’s Data Availed in Wild

The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part Two

It's important to establish and test out-of-band communication before you experience an attack, or 'left-of-bang.' ...
Security Boulevard
out-of-band Oklahoma Securities Commission’s Data Availed in Wild

The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part One

Out-of-band communication is a necessity to prohibit outsiders from observing internal incident response activities or taunting response teams ...
Security Boulevard

Russian Hackers Orchestrate Ukrainian Telecom Giant Attack

In a recent revelation by Ukraine’s top cyber official, Illia Vitiuk, it has been unveiled that the cyberattack on Kyivstar, Ukraine’s largest telecom operator, had its roots embedded months before the notorious ...