Posts

Showing posts from June, 2024

Top Cyber Security Tips You Need!

Image

If your organization is affected by the #Log4j critical vulnerability, are you: A. Trusting your existing cybersecurity strategy to detect & prevent the threat, or B. Exploring new initiatives to address the threat Tell us 👇.

If your organization is affected by the #Log4j critical vulnerability, are you: A. Trusting your existing cybersecurity strategy to detect & prevent the threat, or B. Exploring new initiatives to address the threat Tell us 👇.

Global Security Operations Center Study Results

A survey of 1,000 SOC team members revealed some startling results that reinforce the highly volatile state of today's cybersecurity environment. Download the report to access the findings that should give every organization pause. View: Global Security Operations Center Study Results

​​Microsoft is a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

As a Microsoft Security partner, we're proud - but not surprised - that Microsoft was named a Leader in the "2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms." Microsoft's advanced endpoint security protection continues to help organizations protect their endpoints against even the most sophisticated attacks. In this article, you'll read about Defender for Endpoint and its many capabilities. Read More...

Hunting for Log4j CVE-2021-44228 (Log4Shell) Exploit Activity

Take a deep dive into the malware payload used by one of the Log4j threat actors performing exploitation attempts and see how cybersecurity teams hunt for suspicious activities that may indicate their network has been affected. Read the blog to gain insight into how different threat actors and groups will utilize the Log4j vulnerability to deploy even more sophisticated malware and payload onto vulnerable servers. Contact us to discuss implementing a Log4j security strategy. Read More...

Understanding and Responding to the Apache Log4j Vulnerability

As security practitioners turn their attention to the Log4j vulnerability, researchers warn remediation will be a marathon, not a sprint. Listen to this webinar hosted by Palo Alto Networks Zero Trust Strategy Director Rob Rachwald and his guests, as he discusses how organizations can successfully maneuver around Log4j and come out safely on the other side. Rachwald is joined by Wendi Whitmore, Palo Alto Networks SVP of Unit 42, and Ankur Shah, Palo Alto Networks SVP of Product, Prisma Cloud. Read More...

Log4Shell Compromise Assessment

This datasheet highlights how Palo Alto Networks Unit 42 proactively searches for historical and ongoing indicators of compromise to discover previously undetected malicious activity that may be occurring in your environment. A must read for IT decisionmakers and senior staff interested in understanding and managing their Log4j risk. View: Log4Shell Compromise Assessment

Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team | Microsoft Security Blog

Microsoft's Copilot AI assistant offers great opportunities for helping SOCs and other security professionals in their work. That's why the Microsoft Defender Experts team has been exploring ways in which Copilot for Security can help them to streamline and optimize SOC capabilities — from improving communication clarity to data analysis and upskilling. In this article, Microsoft brings you a new series of short videos showing how Copilot is helping navigate threat detection, investigation, and managed response. Read More...

Top Questions Your C-Suite and Board Will Ask About Log4j

This webinar features several Palo Alto Networks Unit 42 strategic advisory security experts in a discussion that walks through critical next steps in communicating your organization's response and mitigation plans for Log4j to your C-Suite and Board. It's a must watch for senior IT decision makers. Check it out and then contact a Palo Alto Networks consultant at Cyber Security Consulting Ops for next steps. Read More...