Zero Trust

5 Cybersecurity and Threat Trends CISOs Must Watch

No matter the perimeter, IT hygiene remains imperative, said James Carder, CSO at LogRhythm. If businesses were previously bad at configurations, locking systems down, managing privileges and protecting sensitive data, they’ve pushed everything to the cloud and made it internet-accessible.

Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example

Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example

Watch this on-demand webcast to learn how to make threat research an actionable part of your security operations, using recent reporting on Maze ransomware as an example.