Security

upguard

What is Vendor Risk Management: The Definitive Guide to VRM

Vendor risk management (VRM) deals with the management and monitoring of risks resulting from third-party vendors and suppliers of information technology (IT) products and services. VRM programs are concerned with ensuring third-party products, IT vendors and service providers do not result in business disruption or financial and reputational damage.

bulletproof

What is The Cyber Kill Chain?

The cyber kill chain illustrates the structure of a successful cyber attack. It is effectively the hacker’s process from beginning to end, from scoping a target (reconnaissance) all the way to achieving their objective, whether that’s data theft or dropping and executing malware. When approaching your cyber security strategy, you should align your defences to the cyber kill chain. Like Batman becoming fear, to defeat the hacker, you must become a hacker.

alienvault

How Bug Bounty programs work

With cybercrime on the rise, companies are always looking for new ways to ensure they are protected. What better way to beat the hackers than to have those same hackers work FOR you. Over the past few years, corporations have turned to Bug Bounty programs as an alternative way to discover software and configuration errors that would’ve otherwise slipped through the cracks.

siemplify

The Difference Between Alert-Centric vs. Threat-Centric SOAR (Video)

After years of investing in best-of-breed detection and SIEM tools, security operations centers are buried in alerts, giving rise to interest in security orchestration, automation, and response (SOAR) technologies. Not unlike other security solution categories, many of the vendors in the SOAR space tout similar, if not the exact same, benefits.

sqreen

Top 10 security traps to avoid when migrating from a monolith to microservices

Your team is thinking about migrating from a monolithic architecture to microservices. You’re intrigued. The promises of additional scalability and more predictable deployments sound nice. You’ve also been down this road before, and you know that those promises don’t always equal reality. You also know that migrations to a microservice approach don’t always go as planned.