Jump to content

Search the Community

Showing results for tags 'threat detection'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General
    • General Discussion
    • Artificial Intelligence
    • DevOpsForum News
  • DevOps & SRE
    • DevOps & SRE General Discussion
    • Databases, Data Engineering & Data Science
    • Development & Programming
    • CI/CD, GitOps, Orchestration & Scheduling
    • Docker, Containers, Microservices, Serverless & Virtualization
    • Infrastructure-as-Code
    • Kubernetes & Container Orchestration
    • Linux
    • Logging, Monitoring & Observability
    • Security, Governance, Risk & Compliance
  • Cloud Providers
    • Amazon Web Services
    • Google Cloud Platform
    • Microsoft Azure

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


LinkedIn Profile URL


About Me


Cloud Platforms


Cloud Experience


Development Experience


Current Role


Skills


Certifications


Favourite Tools


Interests

Found 6 results

  1. ReversingLabs TitaniumScale delivers high-volume, high-speed file analysis that seamlessly integrates into existing infrastructure and effectively scales with business needs. Powered by RL’s proprietary, AI-driven complex binary analysis, files and objects can be fully inspected and classified in mere seconds. This unprecedented processing speed means enterprises can scale to millions of files a day with incredible efficacy of analysis. The post Announcing the General Availability of TitaniumScale v5.0: Enhancing File Analysis for Advanced Threat Detection appeared first on Security Boulevard. View the full article
  2. Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways to break in and execute attacks. The DTEX i3 Team has issued a Threat Advisory to provide insight on how malicious insiders are exploiting commonly trusted tools, such as Google Workspace, to steal data and … Continued The post DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse appeared first on DTEX Systems Inc. The post DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse appeared first on Security Boulevard. View the full article
  3. SOC teams frequently look to the IP geolocation to determine whether an alert or activity poses a genuine threat. However, with the changing threat landscape, relying solely on this information is no longer sufficient. In this blog post, we explain why, drawing insights from our investigations, and offer guidance for a more comprehensive approach. The […] The post Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation appeared first on Obsidian Security. The post Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation appeared first on Security Boulevard. View the full article
  4. Amazon GuardDuty adds three new threat detections to help detect suspicious DNS traffic indicative of potential attempts by malicious actors to evade detection when performing activities such as exfiltrating data, or using command & control servers to communicate with malware. View the full article
  5. Amazon GuardDuty has added new functionality to its integration with AWS Organizations to make it even simpler to enforce threat detection across all accounts in an organization. Since April 2020, GuardDuty customers can leverage its integrations with AWS Organizations to manage GuardDuty for up to 5,000 AWS accounts, as well as automatically apply threat detection coverage to new accounts added to the organization. In some case, this could still result in coverage gaps, for example, if GuardDuty was not applied to all existing accounts, or if it was unintentionally suspended in individual accounts. Now with a few steps in the GuardDuty console, or one API call, delegated administrators can enforce GuardDuty threat detection coverage for their organization by automatically applying the service to all existing and new accounts, as well as automatically identifying and remediating potential coverage drift. To learn more, see the Amazon GuardDuty account management User Guide. View the full article
  6. San Francisco, CA, Rome, ITALY, May 16, 2022 — Exein is an innovative company and leading provider of Embedded Security Solutions for IoT Devices. With proprietary AI algorithms, their product detects and mitigates cyber threats to protect your customers and devices from malicious attacks. Pulsar is Exein’s modular agent framework that provides reactive defence capabilities with […] The post The World’s Most Advanced Embedded Security Solution appeared first on DevOps.com. View the full article
  • Forum Statistics

    43.8k
    Total Topics
    43.3k
    Total Posts
×
×
  • Create New...