Remove Authentication Remove Data collection Remove Webinar
article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

Active Lock protects individual files by requiring step-up authentication until the threat is cleared. There are many options for step-up authentication, including Cisco Duo OTP and push notifications. Also have a look at a webinar recording about the D3E technology here. [2] Read more about MISP here. Read more here.

article thumbnail

Developer Roll Up: March 2023

Security Boulevard

Join us for this month’s live webinar where Matt Bromiley, our Lead Solutions engineer, will be discussing LimaCharlie's detection and response capabilities. The granularity of the data collected and sent is controlled by the user. As always, our free tier lets you get started with LimaCharlie without entering a credit card.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Case for Multi-Vendor Security Integrations

Cisco Security

Data collected from Umbrella can then be routed to Sumo’s Cloud SIEM, where it is then automatically normalized and applied to our rule’s engine. Cmd helps companies authenticate and manage user security in Linux production environments without slowing down teams — you don’t need to individually configure identities and devices.

Firewall 144
article thumbnail

ADCS Attack Paths in BloodHound?—?Part 1

Security Boulevard

For those who prefer watching over reading, check out the recording of our webinar: AD CS Attack Paths in BloodHound. 3) The certificate template defines EKUs that enable client authentication. PKINIT Client Authentication (1.3.6.1.5.2.3.4) PKINIT Client Authentication (1.3.6.1.5.2.3.4) 4) Manager approval is disabled.

article thumbnail

Security Roundup June 2024

BH Consulting

There’s a summary page, together with a more detailed report and a webinar explaining the key details. BH Consulting’s senior data protection consultant Tracy Elliott shared her observations in a blog, and the 148-page report is free to download. MORE Cisco Talos: brute-force attacks on VPNs and authentication are rising.

article thumbnail

Defining Good: A Strategic Approach to API Risk Reduction

Security Boulevard

What data in motion is associated with them? What security attributes are associated with them, such as authentication type, rate-limiting, etc.?) To learn more about Salt’s API posture governance engine, join our webinar, “A New Strategy for Reducing API Risk,” on Tuesday, January 30 at 9am PT/12pm ET. Register here.

Risk 59