Information Security Archives - Tech Research Online Tue, 10 Sep 2024 19:34:24 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://techresearchonline.com/wp-content/uploads/2024/05/favicon.webp Information Security Archives - Tech Research Online 32 32 Singularity™ AI SIEM  https://techresearchonline.com/sentinelone/singularity-ai-siem/ Fri, 06 Sep 2024 19:27:49 +0000 https://techresearchonline.com/?p=10186 Designed for the autonomous SOC, AI SIEM empowers your analysts to operate at peak efficiency. Leveraging the advanced AI and automation capabilities of the SentinelOne Singularity™ Data Lake, you can enable your SOC analysts to detect and respond to threats faster allowing you to then allocate resources more effectively to improve your overall security posture. 

The post Singularity™ AI SIEM  appeared first on Tech Research Online.

]]>
SentinelOne

Singularity™
AI SIEM 

Designed for the autonomous SOC, AI SIEM empowers your analysts to operate at peak efficiency. Leveraging the advanced AI and automation capabilities of the SentinelOne Singularity™ Data Lake, you can enable your SOC analysts to detect and respond to threats faster allowing you to then allocate resources more effectively to improve your overall security posture. 

Discover how Singularity™ AI SIEM can transform your SOC:

  • Leverage AI-driven algorithms to analyze vast data sets, identify patterns and anomalies, and benefit from automated playbooks and step-by-step threat handling guidance.
  • Gain a comprehensive view with our real-time monitoring dashboard, enabling swift and informed decision-making.
  • Stay ahead of emerging threats with integrated threat intelligence, enhancing proactive defense strategies.
  • Streamline security operations by automating repetitive tasks, reducing manual intervention, and allowing your team to focus on strategic initiatives.

Download the Infographic

Download the Infographic

[contact-form-7]

The post Singularity™ AI SIEM  appeared first on Tech Research Online.

]]>
Strengthening Security Operations with Data and AI  https://techresearchonline.com/sentinelone/strengthening-security-operations-with-data-and-ai/ Fri, 06 Sep 2024 19:26:55 +0000 https://techresearchonline.com/?p=10139 If your security data could talk, what would it say? With generative AI, this question isn’t rhetorical. While AI is making waves across all industries, its transformative potential is especially clear in security.

The post Strengthening Security Operations with Data and AI  appeared first on Tech Research Online.

]]>
SentinelOne

Strengthening Security
Operations with Data
and AI

If your security data could talk, what would it say? With generative AI, this question isn’t rhetorical. While AI is making waves across all industries, its transformative potential is especially clear in security. Providing generative AI and traditional AI models with the data they need to be accurate, and performant requires organizations to establish a single foundation of high-quality, standardized data.

But getting there can be challenging for numerous reasons:

  • Organizations often have multiple data lakes using different schemas, data formats, data governance practices, and more.
  • They may be storing massive volumes of data that require a significant investment to bring together.
  • They use disparate tools or solutions that don’t integrate with one another, creating data, product, and workflow siloes.
  • They may not have the resources needed to unify a data estate, such as talent or capital

What’s needed is a holistic approach to data and AI—an approach that accounts for everything from the data sources, to the AI models, to the process of surfacing insights to the security team while keep costs manageable. It’s time to move away from a siloed approach to data, solutions, and workflows.

Download the eBook

Download the eBook

[contact-form-7]

The post Strengthening Security Operations with Data and AI  appeared first on Tech Research Online.

]]>
Strengthening Security Operations with Data and AI – Infographic https://techresearchonline.com/sentinelone/strengthening-security-operations-with-data-and-ai-infographic/ Fri, 06 Sep 2024 19:26:40 +0000 https://techresearchonline.com/?p=10184 If your security data could talk, what would it say? With generative AI, this question isn’t rhetorical. While AI is making waves across all industries, its transformative potential is especially clear in security.

The post Strengthening Security Operations with Data and AI – Infographic appeared first on Tech Research Online.

]]>
SentinelOne

Strengthening Security
Operations with Data
and AI – Infographic 

If your security data could talk, what would it say? With generative AI, this question isn’t rhetorical. While AI is making waves across all industries, its transformative potential is especially clear in security. Providing generative AI and traditional AI models with the data they need to be accurate, and performant requires organizations to establish a single foundation of high-quality, standardized data. 

But getting there can be challenging for numerous reasons:

  • Organizations often have multiple data lakes using different schemas, data formats, data governance practices, and more.
  • They may be storing massive volumes of data that require a significant investment to bring together.
  • They use disparate tools or solutions that don’t integrate with one another, creating data, product, and workflow siloes.
  • They may not have the resources needed to unify a data estate, such as talent or capital

What’s needed is a holistic approach to data and AI—an approach that accounts for everything from the data sources, to the AI models, to the process of surfacing insights to the security team while keep costs manageable. Data is the fuel that powers AI and transforms security operations. It’s time to move away from a siloed approach to data, solutions, and workflows.

Download the Infographic

Download the Infographic

[contact-form-7]

The post Strengthening Security Operations with Data and AI – Infographic appeared first on Tech Research Online.

]]>
The Architect’s Checklist https://techresearchonline.com/sentinelone/the-architects-checklist/ Fri, 06 Sep 2024 19:26:17 +0000 https://techresearchonline.com/?p=10185 Defending against modern threats starts with data. A lot of it. Spotting, understanding, and disrupting cyber adversaries requires deep awareness of everything happening across your organization, from the desktop to the cloud.

The post The Architect’s Checklist appeared first on Tech Research Online.

]]>
SentinelOne

The Architect’s
Checklist

Defending against modern threats starts with data. A lot of it. Spotting, understanding, and disrupting cyber adversaries requires deep awareness of everything happening across your organization, from the desktop to the cloud. Collecting, storing, and working with telemetry at scale unlocks crucial workflows for defenders. 

Discover key strategies for creating a data platform that:

  • Quickly extract and analyze data to gain real-time insights, minimizing delays that can give adversaries an advantage.
  • Implement role-based access controls to safeguard sensitive information and ensure analysts have the appropriate level of access.
  • Easily integrate new data sources, both structured and unstructured, to adapt to the evolving threat landscape.

Download the Infographic

Download the Infographic

[contact-form-7]

The post The Architect’s Checklist appeared first on Tech Research Online.

]]>
The Unified Platform Advantage https://techresearchonline.com/sentinelone/the-unified-platform-advantage/ Fri, 06 Sep 2024 19:20:16 +0000 https://techresearchonline.com/?p=10179 Today, 75% of organizations are pursuing a security vendor consolidation strategy for a simple reason: CISOs see it as the best path to building and maintaining a strong security posture while also reducing costs and complexity.

The post The Unified Platform Advantage appeared first on Tech Research Online.

]]>
SentinelOne

The Unified Platform
Advantage

Today, 75% of organizations are pursuing a security vendor consolidation strategy for a simple reason: CISOs see it as the best path to building and maintaining a strong security posture while also reducing costs and complexity. But while the trend toward  consolidation is clear, there are a host of considerations that influence an organization’s strategy. For some, preserving flexibility is critical. For others, what’s most important is 
prioritizing efficiency and simplicity. These types of considerations are leading many organizations towards a security platform approach. Check out this eBook to gain a better understanding of the advantages of consolidation and the what the right path forward for your organization may be. 

Discover how security vendor consolidation is transforming enterprise security by:

  • Consolidating platforms integrate multiple tools, reducing complexity and providing a cohesive security posture.
  • Minimizing expenses associated with managing multiple vendors and optimizing resource allocation with a unified approach.
  • Achieving a strong security posture without compromising on the adaptability required to meet diverse organizational needs.
  • Leveraging an Integrated Security Platform by ensuring seamless integration and real-time updates.

Download the eBook

Download the eBook

[contact-form-7]

The post The Unified Platform Advantage appeared first on Tech Research Online.

]]>
The Art of Threat Hunting https://techresearchonline.com/sentinelone/the-art-of-threat-hunting/ Fri, 06 Sep 2024 19:17:40 +0000 https://techresearchonline.com/?p=10181 Threat hunting is a proactive cybersecurity practice where security analysts use experience and ingenuity to search for, identify, and eradicate advanced threats that evade existing security measures. In many organizations it represents the best opportunity to uncover the most sophisticated threat actors.

The post The Art of Threat Hunting appeared first on Tech Research Online.

]]>
SentinelOne

The Art of Threat
Hunting

Threat hunting is a proactive cybersecurity practice where security analysts use experience and ingenuity to search for, identify, and eradicate advanced threats that evade existing security measures. In many organizations it represents the best opportunity to uncover the most sophisticated threat actors. Check out this 5-step guide to help you threat hunt more effectively. 

What You’ll Learn:

  • Survey: Assess the tools and data available to your team to ensure effective threat hunting.
  • Hypothesize: Develop and test theories on potential threats based on your organization’s unique threat landscape.
  • Execute: Run specific hunting queries to detect anomalies and uncover potential threats.
  • Analyze: Filter through the results to distinguish between benign activities and real threats.
  • Improve: Learn from each hunt and continuously enhance your threat-hunting capabilities.

Download the Guide

Download the Guide

[contact-form-7]

The post The Art of Threat Hunting appeared first on Tech Research Online.

]]>
5 Strategies To Defend Against The Growing Risk Of Ransomware https://techresearchonline.com/sentinelone/5-strategies-to-defend-against-the-growing-risk-of-ransomware/ Fri, 06 Sep 2024 19:12:41 +0000 https://techresearchonline.com/?p=10182 Recent ransomware incidents have painted some striking pictures, from casino slot machines plastered with error messages, to thousands of packages stacking up undelivered, to a nationwide fuel shortage.

The post 5 Strategies To Defend Against The Growing Risk Of Ransomware appeared first on Tech Research Online.

]]>
SentinelOne

5 Strategies To Defend
Against The Growing
Risk Of Ransomware

Recent ransomware incidents have painted some striking pictures, from casino slot machines plastered with error messages, to thousands of packages stacking up undelivered, to a nationwide fuel shortage. The risks go beyond the cost of downtime and can encompass permanently lost data or assets, reputational damage, legal consequences, sensitive data made public, and even the monetary impact of paying the ransom itself. Check out our latest eBook for the latest ranswomare trends and actionable next steps to safeguard your business against ransomware. 

Protect Against Ransomware: A Five-Step Guide

  1. Pinpoint weak spots in your network that could be exploited by ransomware.
  2. Implement strong measures to prevent identity theft and unauthorized access.
  3. Safeguard your network to halt the spread of ransomware if it strikes.
  4. Enhance your ability to proactively detect and respond to ransomware attacks.
  5. Develop a solid plan to minimize damage in case of a ransomware attack.

Download the eBook

Download the eBook

[contact-form-7]

The post 5 Strategies To Defend Against The Growing Risk Of Ransomware appeared first on Tech Research Online.

]]>
Dutch Regulator Fines Uber for Violating Data Privacy https://techresearchonline.com/news/dutch-regulator-fine-uber/ Mon, 26 Aug 2024 09:20:45 +0000 https://techresearchonline.com/?post_type=news&p=9948 American ride-hailing platform Uber has been slapped with a $324 million fine in the Netherlands. Uber got fined after the Dutch Data Protection Authority (DPA) found that the company was violating the EU’s data protection laws by sending sensitive personal data to the US. Bloomberg reported that the $324 million fine is the highest that […]

The post Dutch Regulator Fines Uber for Violating Data Privacy appeared first on Tech Research Online.

]]>
American ride-hailing platform Uber has been slapped with a $324 million fine in the Netherlands. Uber got fined after the Dutch Data Protection Authority (DPA) found that the company was violating the EU’s data protection laws by sending sensitive personal data to the US.

Bloomberg reported that the $324 million fine is the highest that the Dutch DPA has issued. It’s also the largest fine that Uber has received globally.

Serious Violation

Uber is said to have transferred cab drivers’ data to the US without proper safeguards over a two year period. The Dutch DPA said its investigations showed that Uber driver data sent to the US included taxi licenses, photos, location data, IDs, and in some instances, medical and criminal records.

This constitutes a serious violation of the General Data Protection Regulation (GDPR). In Europe, the GDPR protects people’s fundamental rights by requiring companies and governments to handle personal data with care. But outside Europe, this is unfortunately not the case. This is why companies are usually obliged to take extra measures if they store personal data of Europeans outside the European Union,” Dutch DPA Chair Aleid Wolfsen said.

However, the DPA said that Uber stopped doing so late last year and implemented proper safeguards.

Uber to Appeal

The Dutch DPA commenced investigations on the Uber Netherlands driver data case after a human rights organization from France raised complaints with authorities in the country. The rights organization was acting on behalf of 170 cab drivers.

The complaint was forwarded to the Netherlands where Uber’s European headquarters are located. Uber was quick to deny any wrongdoing, saying the fine was not justified. In a separate statement, the French data protection regulator said it cooperated with the DPA in the case.

This flawed decision and extraordinary fine are completely unjustified. Uber’s cross-border data transfer process was compliant with GDPR during a 3-year period of immense uncertainty between the EU and US,” Uber spokesperson Caspar Nixon said in an email.

Uber’s spokesperson said the company will appeal the decision and is confident that common sense will prevail. Uber can file an appeal with the DPA. If unsuccessful, the company can move the case to Dutch courts.

Second Fine in a Year

This is the second time that the Dutch DPA has fined Uber. Earlier this year, the privacy regulator fined the ride-hailing company $11 million for infringing on data privacy regulations, including handling and retention of personal data belonging to cab drivers.

The authority found that Uber had not laid out the terms and conditions for retaining drivers’ personal data, including how long the company would hold such data. The DPA also said the process of facilitating drivers to request access to their personal data was unnecessarily complicated.

A Data Privacy Framework developed last year brought to an end three years of legal headaches for tech giants. CCIA’s Head of Policy Alexandre Roure, says the decision by the Dutch DPA ignores reality.

The busiest internet route in the world could not simply be put on hold for three entire years while governments worked to establish a new legal framework for these data flows,” he said.

CCIA is a tech industry association of which Uber is a member. Companies that violate the EU’s GDPR law can be fined up to 4% of their annual global revenue.

The post Dutch Regulator Fines Uber for Violating Data Privacy appeared first on Tech Research Online.

]]>
Cyberattack Disrupts Chip Production at Microchip Technology https://techresearchonline.com/news/microchip-technology-cyberattack/ Thu, 22 Aug 2024 08:53:56 +0000 https://techresearchonline.com/?post_type=news&p=9886 US chip manufacturer Microchip Technology has reported a cyberattack. The Microchip hit by cybercriminals compromised servers, forcing the company to shut some of its systems and reduce operations. Microchip Technology supplies chips to the defense industry. Yahoo Finance reported that the chipmaker detected suspicious activity in its information technology systems on August 17. Server Breach […]

The post Cyberattack Disrupts Chip Production at Microchip Technology appeared first on Tech Research Online.

]]>
US chip manufacturer Microchip Technology has reported a cyberattack. The Microchip hit by cybercriminals compromised servers, forcing the company to shut some of its systems and reduce operations.

Microchip Technology supplies chips to the defense industry. Yahoo Finance reported that the chipmaker detected suspicious activity in its information technology systems on August 17.

Server Breach

A regulatory filing made by Microchip Technology shows the company noticed that some of its servers and business operations had been breached two days after suspicious activity was detected.

Microchip Technology said it has taken prompt action to fix the breach. These actions include isolating systems that were affected by the breach and shutting down specific systems. The chip maker has also commenced an investigation into the attack with the help of external cybersecurity experts.

Microchip Slowing Down

The move to shut down specific systems has caused some of Microchip’s operations to run at suboptimal levels. The slowdown in operations has affected the company’s ability to fulfill chip orders.

But the Arizona-based chipmaker won’t be the first to experience order fulfillment delays this year. Earlier this month, Nvidia announced that the launch of its new AI chips could be delayed for three or more months due to design flaws.

Microchip says it’s not sure whether the cyberattack will have a significant impact on its financial results.

The company is working diligently to bring the affected portions of its IT systems back online, restore normal business operations, and mitigate the impact of the incident. As the company’s investigation is ongoing, the full scope, nature, and impact of the incident are not yet known,” The company said in a statement.

Earlier this year, Microchip received funding from the US Chips and Science Act to boost production of semiconductors that are used in weapon systems and cars.

Multiple Chip Maker Attacks

In recent years, chip manufacturers have been targeted with different types of cyberattacks. The recent cyberattack on Microchip comes at a time when countries across the world are competing to dominate the chip market. The competition is driven by the need for national security and a desire to prevent supply-chain challenges experienced during the pandemic.

Two years ago, leading chipmaker Nvidia suffered a cyberattack that appeared to be ransomware. Although the company said the attack never interrupted its commercial activities, the attack reportedly exposed email addresses and passwords belonging to about 71,000 individuals, including employees.

Following the data breach, Nvidia notified law enforcement about the attack, engaged cybersecurity incident response experts, and strengthened its network security. About two months ago, Taiwan-based chip maker GlobalWafers also suffered a cyberattack that brought its operations to a halt.

The post Cyberattack Disrupts Chip Production at Microchip Technology appeared first on Tech Research Online.

]]>
The Complete MDR Buyer’s Guide https://techresearchonline.com/rapid7/the-complete-mdr-buyers-guide/ Tue, 20 Aug 2024 19:10:45 +0000 https://techresearchonline.com/?p=9771 In today’s rapidly evolving threat landscape, traditional security measures often fall short. Security teams grapple with technology, headcount, and expertise challenges, making it increasingly difficult to protect their organizations effectively. As cyber risks top the list of CEO concerns, a robust MDR solution is no longer a luxury but a necessity

The post The Complete MDR Buyer’s Guide appeared first on Tech Research Online.

]]>

The Complete
MDR Buyer’s Guide

Confidently evaluate a Managed Detection and
Response (MDR) solution for your security program 

In today’s rapidly evolving threat landscape, traditional security measures often fall short. Security teams grapple with technology, headcount, and expertise challenges, making it increasingly difficult to protect their organizations effectively. As cyber risks top the list of CEO concerns, a robust MDR solution is no longer a luxury but a necessity. According to Gartner, 60% of businesses will turn to MDR services to enhance their Security Operations Centers (SOCs) by 2025. This comprehensive guide will walk you through the process of selecting the right MDR provider to bolster your security posture. 

In this guide you will learn how to:

  • Identify the key criteria for evaluating MDR solutions.
  • Extend your security team’s capabilities without additional headcount.
  • Bridge the cybersecurity skills gap with expert MDR services.
  • Implement advanced threat detection and response strategies.
  • Consolidate security functions for a more streamlined SOC.
  • Justify the cost of MDR services with clear ROI benefits.

Download the guide

Download the guide

[contact-form-7]
about-rapid7

About Rapid7

Rapid7 is a leading cybersecurity company dedicated to creating a more secure digital future. With a portfolio of best-in-class solutions, Rapid7 empowers security professionals to manage risk and eliminate threats across the entire threat landscape. The company fosters open-source communities and cutting-edge research, using these insights to optimize its products and arm the global security community with the latest in attacker methodology.  

The post The Complete MDR Buyer’s Guide appeared first on Tech Research Online.

]]>
Ransomware Radar Report https://techresearchonline.com/rapid7/ransomware-radar-report/ Tue, 20 Aug 2024 19:00:00 +0000 https://techresearchonline.com/?p=9764 The stakes have never been higher. Ransomware has evolved into a high-stakes game, where cybercriminals hold your data hostage. The 2024 Rapid7 Ransomware Radar Report is your playbook, equipping you with the insights to outsmart the attackers and protect what matters most. 

The post Ransomware Radar Report appeared first on Tech Research Online.

]]>

Ransomware Radar
Report

The Threat is Real, and It’s Evolving

The stakes have never been higher. Ransomware has evolved into a high-stakes game, where cybercriminals hold your data hostage. The 2024 Rapid7 Ransomware Radar Report is your playbook, equipping you with the insights to outsmart the attackers and protect what matters most. 

In this guide, you will understand about:

  • The rise of new ransomware groups and their evolving tactics
  • The increasing frequency and sophistication of ransomware attacks
  • The industries most at risk and why
  • The critical role of initial access and how attackers gain entry
  • The encryption methods used by ransomware and how they’re changing
  • The programming languages favored by ransomware developers
  • Actionable insights to strengthen your defenses against ransomware

Download the guide

Download the guide

[contact-form-7]
about-rapid7

About Rapid7

Rapid7 is a leading cybersecurity company dedicated to creating a more secure digital future. With a portfolio of best-in-class solutions, Rapid7 empowers security professionals to manage risk and eliminate threats across the entire threat landscape. The company fosters open-source communities and cutting-edge research, using these insights to optimize its products and arm the global security community with the latest in attacker methodology. 

The post Ransomware Radar Report appeared first on Tech Research Online.

]]>
The Tech Leader’s Guide to Remote Work https://techresearchonline.com/andela/the-tech-leaders-guide-to-remote-work/ Wed, 14 Aug 2024 14:08:40 +0000 https://techresearchonline.com/?p=9745 We are witnessing a transformative work movement. As companies grapple with the right mix of in-office, hybrid, and fully remote, it’s become clear there is no one-size-fits-all solution

The post The Tech Leader’s Guide to Remote Work appeared first on Tech Research Online.

]]>

The Tech Leader's Guide
to Remote Work

Master the transition to a remote-first environment and
drive sustainable success 

We are witnessing a transformative work movement. As companies grapple with the right mix of in-office, hybrid, and fully remote, it’s become clear there is no one-size-fits-all solution. To retain and attract top talent, enterprises need a proven strategy that empowers them to create a frictionless employee experience that supports their needs. Many organizations are defaulting to a hybrid model, but is it the right choice?
Read this eBook to learn how to transition your workforce to a remote-first environment and determine the right scalability strategy for your business. 

In this eBook, you will learn how to:

  • Develop an infrastructure that supports a remote-first mindset, enabling your teams to thrive.
  • Leverage proven strategies to enhance productivity, job satisfaction, and employee retention in a distributed work environment.
  • Address concerns about security, trust, and productivity with actionable solutions tailored for remote tech teams.
  • Integrate the right digital tools that facilitate seamless communication and collaboration.
  • Effectively scale your operations globally while maintaining compliance, security, and high performance.

Download the eBook

Download the eBook

[contact-form-7]

About Andela

Andela is a global private talent marketplace powered by the industry’s only unified platform to manage the complete tech talent lifecycle. Andela Talent Cloud provides an AI-driven platform that helps enterprises source, qualify, hire, manage, and pay global technical talent in one integrated platform. Powerful AI-matching algorithms learn from thousands of touch points in the hiring journey to pinpoint the best technologists up to 66% faster at 40% less cost than other hiring approaches.

The post The Tech Leader’s Guide to Remote Work appeared first on Tech Research Online.

]]>