Organizing your conversations with Folders

How do you easily find your way through your conversations? Ever find yourself scrolling endlessly to find the right conversation? We all do. So far we have had some ingenious hacks to help us with this. Fancy naming conventions, or our favorite, using icons for various conversation categories (think ? for bug hunting chats or ? for release and deployment chats).

Requirements of a Security Platform in a DevOps World

Businesses today cannot afford to be hacked. Cyber attacks can result in hefty fines and lawsuits, not to mention the reputational damage that can result in long-term revenue loss. Of course, this has always been true. But what has changed over the past few years is both the sheer volume of attacks and the growing sophistication used in them. As a result, there is a need an updated and upgraded kind of SIEM security platform to face them.


12 mobile device features that help ensure corporate data security

Our hearts might skip a beat every time we put our hands in our pocket and can’t find our mobile phone, and we’re filled with dread at the thought of losing the device that contains our personal photos and the corporate data saved on it. But just misplacing a device is not how we put corporate data at risk; small actions in our day-to-day lives can have a major impact on the safety of the corporate data on our devices.

pandora fms

Web browser security. Is it really safe?

If there is still a reason why you have a post-it covering the webcam of your laptop, if you have not yet had the audacity to delve into the deep web despite all the mysteries they say it contains, if you only enter the Internet in incognito mode, sitting in your armchair with a blindfold: then you’re worried about one thing: safety. Today, in our blog, we will discuss Web browser security. Which are the safest? Is there life beyond Google Chrome?


Ransomware Attack Takes Down German Automation Giant

One of the leading producers of automation tools is still experiencing outages after being hit by a ransomware attack over a week ago. German giant Pilz notified the prosecutor's office and the Federal Office for Security in Information Technology after experiencing a coordinated cyberattack on Sunday, October 13. The company has set up an incident response team to identify the source of the attack and mitigate the issue but has warned that these outages will persist for several more days.


What NIST recommends for cybersecurity and applications

Cybersecurity is a growing concern for businesses of all sizes and industries—and for good reason. As cybersecurity threats and attacks increase each year and more businesses move into software, the trend isn’t likely to subside any time soon. Luckily, there are NIST recommendations to help protect your organization against cyber threats.


The importance of event correlation techniques in SIEM

Event correlation tools are a fundamental instrument in your toolbox to detect threats from all sources across your organization in real time. A wise use of the right event correlation techniques through log management and analysis is the cornerstone of any reliable security information and event management (SIEM) strategy – a strategy that focuses on prevention rather than reaction.


Inside the Capital One Breach, and How to Block It

The Capital One data breach has been big news and for good reason. The exposure of over 100 million personal data records is a big deal—especially when it’s a bank, and especially when it’s a bank like Capital One that has leaned into the cloud so heavily. It is too easy for the skeptics and naysayers to blame the cloud; which makes it even more critical to truly understand what happened.