Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation
Exploity i luki w zabezpieczeniach

Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation

Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.

April 26, 2023
Punkty końcowe

Native Sensors vs. Integrations for XDR Platforms?

Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.

Expert Perspective Feb 03, 2025

Save to Folio

Expert Perspective Feb 03, 2025

Save to Folio

Zgodność z przepisami i ryzyko

Future of Cybersecurity: Will XDR Reshape SIEM & SOAR?

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Expert Perspective Jan 31, 2025

Save to Folio

Expert Perspective Jan 31, 2025

Save to Folio

NDR: Not Just a "Nice to Have" Anymore

Network Detection and Response (NDR) is no longer a 'nice-to-have'—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.

Expert Perspective Jan 30, 2025

Save to Folio

Expert Perspective Jan 30, 2025

Save to Folio

ASRM: A New Pillar for Cyber Insurance Underwriting

ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.

Expert Perspective Jan 29, 2025

Save to Folio

Expert Perspective Jan 29, 2025

Save to Folio

Sztuczna inteligencja (AI)

Invisible Prompt Injection: A Threat to AI Security

This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.

Expert Perspective Jan 22, 2025

Save to Folio

Expert Perspective Jan 22, 2025

Save to Folio