[AWS + D3 Smart SOAR] Unlocking Advanced Security Automation

Automated Incident Response with AWS and Smart SOAR

D3 Smart SOAR offers 12 out-of-the-box integrations with Amazon Web Services (AWS) products. These include: AWS CloudTrail AWS CloudWatch AWS EC2 AWS ECS AWS EKS AWS S3 AWS SQS AWS SSM AWS ...

Leap into Hybrid Environments and Modern Enterprise Asset Analysis with JupiterOne

JupiterOne recently announced a pivotal expansion of their cyber asset analysis platform. This latest update is centered around catering to the rapidly transforming market that is embracing hybrid infrastructure and showcasing an ...

CISA orders federal agencies to catalog their networks, and scan for bugs

You always want to know what is attached to your network. And whether it could be vulnerable or not. In any organisation it’s normal for different devices, on- or off-prem, wired or ...
trade-offs, users, deception devices Cato Networks BYOD tablet Mobile Devices for GDPR Compliance

Refurbished Security Devices: Mistaken Identity or Deception?

Buying refurbished devices is not uncommon. Online marketplaces, such as eBay, offer a platform for customers to purchase second-hand gadgets at a lower price than the original, but at a higher quality ...
Security Boulevard
API Noname CrowdStrike data discovery supply chain zero-days fuzz appsec

CrowdStrike Adds Automated Asset Discovery to Cloud Platform

At the RSAC 2022 event this week, CrowdStrike unveiled CrowdStrike Asset Graph, a new graph database it has added to its cloud security services portfolio. In addition, the company introduced a Humio ...
Security Boulevard

How to Combat Asset Blindness in OT Security

One of the main challenges of OT security is the problem of compatibility. OT components often differ significantly from each other in terms of age and sophistication as well as software and ...

The Challenge of Asset Tracking in Industrial Environments

Asset inventory is a significant part of a comprehensive security plan for all organizations.  After all, if you do not know what assets you have, then you cannot manage them.  Even a ...

Qualys Focuses on Comprehensive Visibility and Asset Management

There are a number of factors that make up effective cybersecurity, but there is one that stands out—visibility. It’s a simple fact that you can’t protect what you aren’t even aware you ...

Asset Discovery with Chris Kirsch Co-Founder at Rumble

Chris Kirsch co-founder and chief revenue officer at Rumble joins us in our June monthly show to talk about how Rumble is solving the problem of asset discovery. You also get to ...
The Importance of Transparency: Finding the Balance Between Security and Visibility

The Importance of Transparency: Finding the Balance Between Security and Visibility

Vulnerabilities are a simple fact of life. The goal for vendors and organizations is not to strive to create perfect hardware or software that has no vulnerabilities—there is no such thing. What’s ...