Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Blog, Learning Center
What is Sentinel? Harnessing the Power of Cloud-Native SIEM for Modern Cybersecurity Challenges
March 6, 2024Explore how Microsoft's Sentinel SIEM solution transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
Blog
New Malware Attributed to Russian Hacking Group APT28
March 6, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting Ukrainian state organizations attributed to the Kremlin-backed nation-state group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP,” detailed in this whitepaper.
More DetailsCyber Threat Intelligence -
Webinar
The Future of Supply Chain Cybersecurity: Navigating the Evolving Landscape
March 5, 2024More DetailsExecutive Viewpoint, Supply Chain Cyber Risk -
Research, White Paper
A technical analysis of the APT28’s backdoor called OCEANMAP
March 5, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting state organizations attributed to the Russian espionage group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP.” Download this whitepaper to explore a technical analysis of APT28’s tactics, techniques, and procedures.
More DetailsVlad Pasca
Cyber Threat Intelligence, Enterprise Cyber Risk, Supply Chain Cyber Risk -
Learning Center
Remediation vs Mitigation in Cybersecurity: Understanding the distinctions and strategic applications
March 5, 2024While remediation and mitigation might seem similar, understanding their distinctions and strategic applications is paramount for building robust defense mechanisms against cyber threats.
More DetailsTech Center -
Learning Center
Leveraging SIEM Splunk for Enhanced Cybersecurity: A Comprehensive Guide
March 4, 2024In this comprehensive guide, we'll delve into the world of SIEM Splunk and explore how organizations can leverage it to enhance their cybersecurity posture.
More DetailsTech Center -
Learning Center
Analyzing FERPA Violation Examples to Strengthen Data Privacy in Education
March 4, 2024The Family Educational Rights and Privacy Act (FERPA) is a crucial piece of legislation designed to safeguard students' educational records. Despite its importance, FERPA violations still occur, highlighting the need for continuous vigilance and proactive measures to strengthen data privacy in education.
More DetailsTech Center -
Blog, Learning Center
Proactive Strategies to Prevent Ransomware Attacks
March 4, 2024Essential strategies to protect your organization from ransomware attacks, including defense mechanisms, regular updates, & employee training.
More DetailsAttack Surface Management, Tech Center -
Blog
SecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups
February 28, 2024The SecurityScorecard Global Third-Party Breach Report uses the world's largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups.
More DetailsPaul Prudhomme, STRIKE Threat Intelligence Analyst
Cyber Threat Intelligence, Supply Chain Cyber Risk -
Press
SecurityScorecard Third-Party Breach Report Reveals Software Supply Chain as Top Target for Ransomware Groups
February 28, 2024SecurityScorecard today released its Global Third-Party Cybersecurity Breach Report. Using the world’s largest proprietary risk and threat data set, SecurityScorecard STRIKE threat hunters analyzed threat groups' mass exploitation of supply chain vulnerabilities.
More Details -
Research
Global Third-Party Cybersecurity Breach Report
February 28, 2024In-depth analysis of the most significant third-party cyber risks and incidents in 2023
More DetailsServices, Supply Chain Cyber Risk -
Webinar
Supply Chain Guardians: Strategies for Resilient Ecosystems
February 28, 2024More DetailsSecurity Ratings, Supply Chain Cyber Risk