Unkategorisiert

Unkategorisiert
Google Chronicle SIEM and SOAR for Enhanced Cybersecurity
Unkategorisiert
Why today’s threat actors target healthcare infrastructures
Unkategorisiert
3 ways companies can protect against critical infrastructure attacks
Unkategorisiert
Protect your code in compliance with GDPR
Unkategorisiert
SIEM Migration: Why now?
Unkategorisiert
How to avoid romance fraud this Valentine’s
Unkategorisiert
Hardening your operating system: A strategic approach to cyber defense
Unkategorisiert
Mitigating cloud transformation risk with cloud-native solutions
Unkategorisiert
How quantum mechanics is transforming cybersecurity: A threat intelligence perspective
Unkategorisiert
Securing the repository manager: Insights from a threat hunter
Unkategorisiert
Cutting Costs with Microsoft Azure Data Explorer (ADX)
Unkategorisiert
An Analysis of the Security Risks Posed by Tor Browser
Unkategorisiert
It’s time to be “Frank” about cybersecurity
Unkategorisiert
Creating a smarter SOC with the MITRE ATT&CK framework
Unkategorisiert
Marketing in the cyber industry and the ethics of Surveillance Capitalism
Unkategorisiert
The path to becoming a SOC Analyst: Interview with Anusthika Shankar
Unkategorisiert
The essential checklist for reducing the impact of ransomware attacks
Unkategorisiert
How business-focused vulnerability management can improve cyber hygiene
Unkategorisiert
BBC interview with President Yuval Wollman: The risks of GenAI
Unkategorisiert
Using Handlebars to get the exact output structures you want from GPT4
Unkategorisiert
Forrester report: GenAI’s impact on security operations
Unkategorisiert
How AI-powered tools and processes are transforming threat hunting
Unkategorisiert
AI security risks: A CISO perspective
Unkategorisiert
Reimagining security governance (part 3)
Unkategorisiert
Securing user IDs & passwords: Insights from a threat hunter
Unkategorisiert
Reimagining security governance (part 2)
Unkategorisiert
Reimagining security governance (part 1)
Unkategorisiert
Advanced Persistent Threats (APTs) related to Chinese proxies
Unkategorisiert
How APTs Maintain a Silent Grip on Enterprise Networks
Unkategorisiert
How AI is shifting the paradigm to give more power to threat actors
Unkategorisiert
Mitigating cloud transformation risk with cloud-native solutions
Unkategorisiert
Mitigating risk after large-scale security team layoffs
Unkategorisiert
Advanced Persistent Threats (APTs) linked to Russian Proxies
Unkategorisiert
How the first UEFI bootkit, BlackLotus, bypassed Windows security
Unkategorisiert
SOC Masterclass recap: AI, geopolitics, the recession and more
Unkategorisiert
A Day in the Life of a SOC Manager: Interview with Aneesh Jayakumar
Unkategorisiert
Threat hunter’s arsenal: The mindset and tools for proactive hunting
Unkategorisiert
Women & Cyber – Debunking Misconceptions for International Women’s Day
Unkategorisiert
Interview: What can we do to boost gender diversity in cybersecurity?
Unkategorisiert
5 Tips for Choosing a Managed EDR Solution
Unkategorisiert
The Case for Managed Endpoint Detection & Response (EDR)
Unkategorisiert
Targeted Threat Intelligence: Turning Challenges to Opportunities
Unkategorisiert
How ransomware actors use EDR bypassing to run cybercrime campaigns
Unkategorisiert
8 New Year’s resolutions for cybersecurity professionals
Unkategorisiert
Cybersecurity: new threats, new models – interview with Yuval Wollman
Unkategorisiert
The real cost of stolen data
Unkategorisiert
5 takeaways from Forrester’s latest privacy report
Unkategorisiert
5 Cyber Health Strategies We Can All Be Thankful For
Unkategorisiert
Are attackers using AiTM to bypass your MFA and obtain account access?
Unkategorisiert
Why data protection is essential for your business
Unkategorisiert
CyberProof SOC Masterclass: Managing cloud-native security operations
Unkategorisiert
IOC Data Suggests Russia Bypassed Geolocation Bans – CTI Report
Unkategorisiert
Double-bounced attacks with email spoofing – 2022 trends
Unkategorisiert
A look at some of the reasons behind top malware trends in 2022
Unkategorisiert
Protecting Enterprises as They Migrate to the Cloud – and Beyond
Unkategorisiert
Considering a Career in Cyber Security? Here’s What You Need to Know
Unkategorisiert
CyberNews: Quick Response as Important as Threat Prevention
Unkategorisiert
What’s Hot at Infosecurity Europe
Unkategorisiert
Why It’s Great to Work for an MDR Provider
Unkategorisiert
Cloud Security, Ransomware Simulation & More in Our SOC Masterclass
Unkategorisiert
Why Use an MDR Provider? Forrester’s Key Findings about the MDR Market
Unkategorisiert
Reducing Alert False Positives with Risk-Based Use Case Mapping
Unkategorisiert
Reducing the Cybersecurity Risks of Mobile Devices
Unkategorisiert
Recent Developments in Russian-Ukrainian Cyber Warfare, April 6, 2022
Unkategorisiert
Recent Developments in Russian-Ukrainian Cyber Warfare, March 23, 2022
Unkategorisiert
Leveraging Threat Hunting Tools to Improve Threat Detection & Response
Unkategorisiert
Recent Developments in Russian-Ukrainian Cyber Warfare, March 15, 2022
Unkategorisiert
Recent Developments in Russian-Ukrainian Cyber Warfare, March 3, 2022
Unkategorisiert
6 Ways Intelligence Boosts Cyber Detection & Response
Unkategorisiert
How Cyber Attackers Use the Custom-Built Exfiltration Tool BlackMatter
Unkategorisiert
Protect Your Organization from Ransomware in 2022
Unkategorisiert
How FOMO – “Fear of Missing Out” – Hurts Effective Security Monitoring
Unkategorisiert
8 Steps to Improving Your SOC’s Incident Detection & Response
Unkategorisiert
Which Countries are Most Dangerous? Cyber Attack Origin – by Country
Unkategorisiert
How Cyber Attackers Have Become Marketing Experts
Unkategorisiert
10 Ways To Keep Your SOC Team Motivated and Avoid Burnout
Unkategorisiert
Mitigating an Exploit in the Log4j2 Logging Library – RCE Zero-day
Unkategorisiert
Holiday Season Cyber Threats
Unkategorisiert
CyberProof’s SOC Masterclass – A 360° Look into SOC Operations
Unkategorisiert
Does Your SOC Measure Up? A “Sneak Peek” into the SANS SOC Survey
Unkategorisiert
Diwali Shopping Season – Must-Know Tips to Protect Your Data & Company
Unkategorisiert
Microsoft Exchange’s Basic Authentication – Know Your Weaknesses
Unkategorisiert
Migrating to the Cloud? Put Cyber Security First!
Unkategorisiert
Why Your Cyber Security Strategy Must Include a Use Case Factory, P2
Unkategorisiert
Why a Use Case Factory is Essential to Your Cyber Security Strategy
Unkategorisiert
How to Develop a Converged IT/OT SOC
Unkategorisiert
5 Tips to Leverage Your Endpoint Detection & Response (EDR) Investment
Unkategorisiert
The Hidden Threats of Potentially Unwanted Programs (PUPs)
Unkategorisiert
CyberProof Introduces the “Hybrid SOC Approach” at InfoSecurity Europe
Unkategorisiert
4 Tips for Migrating to Microsoft Azure Security Stack
Unkategorisiert
Finding the Answers in the Smallest Cracks – a CTI Analyst’s Story
Unkategorisiert
Finding New Balance in the Post-Corona Age
Unkategorisiert
Protecting Your Organization from Ransomware and Cyber Extortion
Unkategorisiert
7 Tips to Securing Office 365
Unkategorisiert
Faced with New Threats, Healthcare Providers Focus on Cyber Security
Unkategorisiert
A Trojan Horse: Protecting Yourself from Malicious Browser Extensions
Unkategorisiert
CyberProof Celebrates International Women’s Day
Unkategorisiert
Wargames – Reducing Cyber Risk with Cyber Attack Simulations
Unkategorisiert
Leveraging Microsoft Sentinel SIEM to Identify Customer-Specific IOCs
Unkategorisiert
Microsoft Azure Sentinel SIEM: Multi-tenancy Deployment (Pt.2)
Unkategorisiert
Microsoft Azure Sentinel SIEM: Multi-tenancy Deployment (Pt.1)
Unkategorisiert
Augmenting Security Operations in the Financial Services Industry
Unkategorisiert
EDR vs. SIEM – Which Approach is Best in 2022?
Unkategorisiert
7 Insights on SolarWinds SUNBURST – the “Cyber Pearl Harbor”
Unkategorisiert
Finding the Right MDR Provider – Our Takeaways from Forrester NowTech
Unkategorisiert
The Smarter SOC Summit Recap –Innovation, Insight, and Fun!
Unkategorisiert
Developing a Smarter SOC with Microsoft Azure & CyberProof
Unkategorisiert
How Retailers Can Ensure Consumer Data Protection This Holiday Season
Unkategorisiert
Cyber Security Trends – What We’ve Learned in 2020
Unkategorisiert
Our Key Takeaways from Forrester’s APAC MSSP Market Research Report
Unkategorisiert
How to Prioritize Your 2021 Cyber Security Budget – 5 Tips for CISOs
Unkategorisiert
Combating the Increased Cyber Security Threats in Australia
Unkategorisiert
Scammers Cash In – Stealing COVID-19 Unemployment Relief
Unkategorisiert
Our 5 Key Takeaways from Forrester’s MSSP Wave™ Report
Unkategorisiert
Does Your Cyber Security Strategy Include a Perimeter Defense?
Unkategorisiert
CyberProof Joins Microsoft Security Association
Unkategorisiert
5G Will Redefine Cyber Security Operations
Unkategorisiert
Cyber Crime Marketplace Uncovered by Our Threat Intelligence Team
Unkategorisiert
Returning to the Office? 7 Data Hygiene and Security Monitoring Tips
Unkategorisiert
Our Take On Forrester’s New Research Around Managed Security Services
Unkategorisiert
Identifying Spear Phishing Attacks – What Remote Workers Need to Know
Unkategorisiert
8 Tips for Spotting Fake News
Unkategorisiert
New Rules of the Game – Business Cyber Security with COVID-19
Unkategorisiert
Cyber Criminals Target IT Services Company Using Maze Ransomware
Unkategorisiert
5 Insights for the Next Era in Cyber Security
Unkategorisiert
Threat Actors Share Zoom Hacking Methods on the Dark Web
Unkategorisiert
Hackers Use Widespread Zoom Mode to Increase Attacks
Unkategorisiert
The New Normal – Staying “Cyber Safe” with Remote Workers
Unkategorisiert
A New Cyber Security Threat – Hackers Take Advantage of Coronavirus
Unkategorisiert
Cyber Security Guidelines & Best Practices for Remote Work Security
Unkategorisiert
Artificial Intelligence and Threat Intelligence: Better Together
Unkategorisiert
Security Automation: The Key to a Smarter SOC
Unkategorisiert
Cyber Insider Threats – A Looming Security Risk
Unkategorisiert
5 Threat Predictions and Cyber Security Trends
Unkategorisiert
Change a Security Analyst’s life with CyberProof Defense Center
Unkategorisiert
Up for the Hunt? Why Security Operations Should Include Threat Hunting
Unkategorisiert
How AI Can Improve Your SOC Efficiency
Unkategorisiert
CyberProof Research Team Detects Multiple DDoS Attacks
Unkategorisiert
4 Steps to Protect Your Privacy During an Online Investigation
Unkategorisiert
What You Need to Know About the Recent Hospital Ransomware Attacks
Unkategorisiert
How to Find the Right Managed Security Service Provider
Unkategorisiert
5 SOC Augmentation Lessons for Proactive Cyber Security
Unkategorisiert
WSH RAT is leaked on a Deep Web Forum – for Free
Unkategorisiert
10 Tips to Step Up Your SOC Operations
Unkategorisiert
How to Prevent Man in the Middle Attacks – Proven Methods for 2022
Unkategorisiert
5 Tips for Successful Implementation of Cyber Security Strategy
Unkategorisiert
7 Takeaways from the Verizon 2019 Data Breach Report
Unkategorisiert
5 Trends That are Changing the Face of Security Operations
Unkategorisiert
6 Ways Scalability Requirements are Impacting Today’s Cyber Security
Unkategorisiert
Top Pains when Not Using the Right SOC as a Service
Unkategorisiert
Leveraging Traditional HUMINT Methodologies in Cyberspace
Unkategorisiert
Insight into the World of Cyber Attack
Unkategorisiert
6 New Year Promises for your Security Service Provider
Unkategorisiert
MSSPs – Forrester Report Evaluates 10 Top Vendors
Unkategorisiert
A Needle in a Haystack – Why Your Organization Needs Digital Forensics
Unkategorisiert
The Magic Mix Needed to Build a Successful SOC
Unkategorisiert
How to Build an Effective Security Perimeter
Unkategorisiert
Shedding Light on the Darknet 
Unkategorisiert
Why Cyber Threat Intelligence is Critical to Your Security Coverage
Unkategorisiert
3 Hot Innovations for Cyber Week 2018
Unkategorisiert
The 4 Best Cyber Tech Sessions Not to Miss at Cyber Week 2018
Unkategorisiert
Top Takeaways from the 2018 IT Security CISO and Analyst Forum
Unkategorisiert
5 Tips to Choosing the Right Cyber Security Strategy
Unkategorisiert
Our take on the Verizon Data Breach Investigations Report
Unkategorisiert
What you need to know about cyber maturity and why it matters