Tag: EN

Integration Spotlight: Stellar Cyber Open XDR

By integrating D3 Smart SOAR (Security Orchestration, Automation, and Response) with Stellar Cyber Open XDR, organizations can create a seamless incident response workflow that minimizes time to contain and enables better decision-making. This article outlines how the integration works and…

Insights from SentinelOne’s OneCon23

Earlier in the month I had the chance to attend OneCon, SentinelOne’s first ever customer conference in Boca Raton, Florida. This event was a pleasure to be at, not least as the Florida weather in November is considerably better than…

Microsoft announces Defender bug bounty program

Microsoft has announced a new bug bounty program aimed at unearthing vulnerabilities in Defender-related products and services, and is offering participants the possibility to earn up to $20,000 for the most critical bugs. The Microsoft Defender bug bounty program Microsoft…

AI Solutions Are the New Shadow IT

Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI is placing CISOs and cybersecurity teams in a tough but familiar spot.  Employees are covertly using AI with little regard for established IT and…

Coincover collaborates with Utila to improve crypto asset management

Coincover has joined forces with Utila, an enterprise-grade crypto operations platform. This strategic partnership brings together Coincover’s renowned protection solutions and Utila’s secure, non-custodial wallet infrastructure. The Utila platform provides a comprehensive and user-friendly approach to crypto asset management, with…

Measuring the Efficacy of your Insider Risk Program

For those dealing with insider risks for as long as I have, justifying the mission can feel akin to providing results to Fermat’s Last Theorem.  There are solutions to each challenge, but maintaining and securing buy-in against competing budgetary requirements…

What Is a Credential Vault?

Most organizations face increasingly complex IT environments with growing numbers of security credentials. This often hampers IT efficiency and poses increasing risks of intrusion and data breach. Plus, ensuring everything complies with the latest policy and compliance requirements is time-consuming…