cybercloud
-
Industry Insights
GozNym Hackers Stole $100 Million – But Made One Mistake
The GozNym cyber attack was first identified in early 2016 as a hybrid malware strain that aimed to steal sensitive…
Read More » -
Best Practices
‘National SOCs’: Government’s Respond to Scale of Cybersecurity Challenge with Whole Sector Operation Centres
Public sector buyers are scaling their cybersecurity operations to meet the scale of challenge they are facing.
Read More » -
Industry Insights
CrowdStrike CEO on AI’s Impact on Cybersecurity Demand
CrowdStrike CEO George Kurtz discusses the threat environment, increasing corporate demand for cybersecurity, and his company's new AI 'Charlotte' and…
Read More » -
Best Practices
Secure Your Business Network with NordLayer’s Cloud Firewall
Cloud Firewalls play a crucial role in safeguarding sensitive information, maintaining compliance with regulations, and ensuring the availability and performance…
Read More » -
Vendor Profile
Rise of the Machines: The 2024 SOC Transformation
Leonid Belkind, CTO and Co-Founder of Torq, shares insights on how AI-driven hyperautomation addresses the existential challenges SOC analysts face.
Read More » -
Vendor Profile
Microsoft Intune Suite – Beyond Endpoint Management in 2024
Simplify endpoint management and security with a single, connected experience with the Microsoft Intune Suite.
Read More » -
Best Practices
Identity Hijacking: Understanding and Prevention
It is crucial to be aware of the risks associated with identity hijacking and take proactive steps to protect yourself…
Read More » -
Vendor Profile
Integrating Jira into your Security Operations Center with XM Cyber
Applications like Jira have become indispensable tools within SOCs, aiding in efficient incident management and response.
Read More » -
Best Practices
What is Identity and Access Management (IdAM)
Identity Management and Cybersecurity are closely intertwined. Effective Identity Management is a cornerstone of robust cybersecurity practices.
Read More » -
Industry Insights
How Do Hackers Hide Themselves? Staying Anonymous Online
Understanding how hackers hide themselves is crucial in order to protect ourselves and our digital assets.
Read More »