Security News
CIEM is the next generation of solutions for managing entitlements and permissions for all cloud infrastructure identities and resources and enforcing least privilege policies in the cloud. Zero Trust Access is impossible to achieve unless the enterprise can manage and eliminate over-permissioned identities in their cloud infrastructures effectively.
Available through the Datadog Marketplace, this new integration enables IT Ops, DevOps, and SRE teams to easily start ingesting events and metrics from Datadog into the Moogsoft Observability Cloud. "Customers rely on Datadog to quickly be alerted on production issues and help them find resolutions," said Ilan Rabinovitch, Vice President of Product and Community at Datadog.
The security company found that 85% of workers spend up to five hours a week watching YouTube, listening to podcasts, or exercising during work hours. Mixing work and play might be a good thing if it breaks up the monotony of security monitoring, according to Kaspersky.
SOC analytics and automation, including security monitoring and incident management tools, are now mission-critical apps and services that are required to support revenue generation in today's changing business landscape. Let's take a look at why analytics and automation are so vital for modern security teams, the possible downsides, and why a cloud-native platform is the future for the SOC. Three core benefits.
The new platform, Trend Micro Vision One, has extended detection and response at its core and raises the bar with new capabilities to help security teams to see more and respond faster. Now, with Vision One, Trend Micro is solving more complex security challenges with enhanced XDR, new risk visibility, new third-party integrations, and simplified response to threats across security layers.
Circa is launching AI Candidate Matching, to help companies accelerate their success toward building more diverse, innovative, and high-performing teams. AI Candidate Matching focuses on candidate sourcing and matching that reaches both active and passive candidates.
Endace announced a strategic partnership with Corelight that will provide security teams with rich insights and detailed forensic data that accelerate the process of detecting, analyzing and responding to network security threats. Corelight sensors produce rich, protocol-specific logs for incident response and threat-hunting workflows within any SIEM. When integrated with EndaceProbe Analytics Platforms these logs include "Pivot-to-Vision" links which connect SIEM events to the related packet data recorded by the EndaceProbes on the network.
Online criminals have increasingly targeted Remote Desktop Protocol connections over the past year, according to infosec biz ESET. During calendar 2020, ESET recorded what it said was a 768 per cent increase in attack attempts on RDP, a key Windows feature for remote working, during the course of the year. Roman Kováč, ESET's chief research officer, said in a statement: "RDP security is not to be underestimated especially due to ransomware, which is commonly deployed through RDP exploits, and, with its increasingly aggressive tactics, poses a great risk to both private and public sectors."
Microsoft will introduce this month a new security alert that will notify enterprise security teams when an employee is being targeted by suspected nation-state attackers. " attacks represent some of the most advanced and persistent threat activity Microsoft tracks.
Employees commonly and inadvertently compromise company data through poor password hygiene, accidental data sharing, improper technology use, phishing scams, and more. Some employees will also act maliciously, intentionally stealing company data for profit, retribution, or fun.