Author Archives: Onsite Computing, Inc.

5 Ways Behavioral Analytics is Revolutionizing Incident Response

Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more Go to […]

13 essential enterprise security tools — and 10 nice-to-haves

As CISOs grapple with a plethora of changing threats daily, the quality of security tools in their kit takes on more importance. The breadth of tools available for securing the enterprise today is staggering. Tool types, and their accompanying marketing nomenclatures, can overlap and be hard to pin down, adding to the confusion as to […]

CISA’s VDP is going gangbusters but could still be improved

CISA’s vulnerability disclosure policy (VDP) platform grew to encompass 51 US government agencies and 12,000 bug reports in its first two years. Experts say increased bug bounties, the consolidation of other agencies’ vulnerability disclosure efforts, and fixing CVE ecosystem weaknesses are among the steps that could give it further strength. On September 30, the Cybersecurity […]

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. “Ymir ransomware introduces a unique combination of technical features and tactics that enhance its effectiveness,” Russian cybersecurity vendor Kaspersky said. “Threat actors leveraged an unconventional blend Go […]

So verhindern Sie KI-gestützte Datenvorfälle

Teerachai Jampanak – Shutterstock.com Es ist der Alptraum jedes Unternehmens: Ein Wettbewerber spricht mit gezielten Kampagnen die eigenen Kunden an. Und zwar so präzise, dass dies kein Zufall sein kann. Es ist anzunehmen, dass der Konkurrent irgendwie Zugang zu diesen sensitiven Daten erhalten hat. Die Quelle der Datenschutzverletzung: Ein ehemaliger Mitarbeitender nutzte einen KI-Assistenten, um […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.