Cybersecurity Tools

A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting

I got to talk to Dragoș Roșioru, a seasoned MXDR expert, about incident response best practices and challenges.   Get an in-depth understanding of the do’s and don’ts in incident response as Dragoș explains how to avoid the most common mistakes Security Officers make. While you’re at it, take a glimpse at Dragoș’s personal incident response best […]

The post A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting appeared first on Heimdal Security Blog.

Cybersecurity Tools

Widespread Vulnerability in SSH Servers: The Terrapin Attack Threat

The Terrapin attack, a newly identified security threat, jeopardizes nearly 11 million SSH servers that are accessible online. Originating from academic research at Ruhr University Bochum in Germany, this attack specifically targets the SSH protocol, affecting both clients and servers. It exploits vulnerabilities during the handshake process, especially when using certain encryption modes, compromising the […]

The post Widespread Vulnerability in SSH Servers: The Terrapin Attack Threat appeared first on Heimdal Security Blog.

Cybersecurity Tools

4 ways to advance your global security operations center

EXECUTIVE SUMMARY: If your organization maintains a Global Security Operations Center (GSOC), ensure that you’re not heavily reliant on legacy systems and processes. In this article, find out about how to strategically advance your operations, enabling you to effectively prevent threats and drive more sustainable business outcomes. What is a global security operations center? In […]

The post 4 ways to advance your global security operations center appeared first on CyberTalk.

Scroll to Top