article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Related Stories Spotlight: When Ransomware Comes Calling Episode 226: The Cyber Consequences Of Our Throw Away Culture Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion. The post Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting appeared first on The Security Ledger with Paul F. Click the icon below to listen.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

billion in 2021, and growing concerns over data security , software supply chains , and ransomware suggest the market will remain strong through economic ups and downs. As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses

The Last Watchdog

Advanced technologies and fresh security frameworks are being implemented to deter cyber attacks out at the services edge, where all the action is. Primary vectors take the form of phishing campaigns, supply chain corruption and ransomware attacks, like the one that recently resulted in the shut down of Colonial Pipeline.

article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used for a $200 billion ransomware caper. The earliest SIEMs cropped up around 2005 or so. Coming of age.

Big data 157
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

What’s more, it will likely take a blend of legacy security technologies – in advanced iterations – combined with a new class of smart security tools to cut through the complexities of defending contemporary business networks. That said, a couple of prominent legacy technologies seem sure to endure as security cornerstones, moving forward.

Firewall 223
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

No organization wants to find itself having to recover from a devastating ransomware hack – or dealing with an unauthorized intruder who has usurped control of its operational systems. The Colonial Pipeline ransomware debacle and the near poisoning of the Oldsmar, Fla. Here are the key takeaways: Lower-tier hacks.

article thumbnail

Is The Cost Of Predictive Cyber Security Worth The Investment?

Security Boulevard

This was in 2005! Even with the advancements in network isolation, containment, and prevention at the endpoint, hackers will still bypass predictive controls to execute malware attacks, ransomware exploits, account takeovers.etc. 2022 — Could We Still Save Jack Bauer Today? What Is Not Covered Under Cyber Insurance?