onpage logo

Category: Cybersecurity

April 6, 2021 | by OnPage Corporation
shift left security

Shifting Security Left: Tools and Best Practices

What Is Shift Left Security? Software development pipelines typically cycle through key four processes—design, development, testing and software or update releases. Traditional pipelines perform quality and security tests only after completing the development phase.  Since there is no such thing as a perfect code, there are always issues to fix. However, if significant architectural changes … Continued

read more
April 2, 2021 | by Ritika Bramhe
SOC

Strategies to Reduce Alert Fatigue in Your SOC Team

In a SOC (security operations center), alerts originating from hundreds of systems compete to get attention. What ensues is a security analyst’s battle to beat alert fatigue while effectively defending their organization from cybersecurity threats.  Alert fatigue is a major challenge faced by security operations center (SOC) teams. The stakes are even higher since they … Continued

read more
December 21, 2020 | by OnPage Corporation
XDR

Will XDR Change Incident Response?

Extended Detection and Response (XDR) is a new security technology that promises to change the way security organizations operate, and introduce important efficiencies to day-to-day processes. In particular, XDR is expected to have a huge impact on incident response teams. In this article, we’ll explain the basics of XDR, show how it addresses incident response … Continued

read more
July 16, 2020 | by Sam Sharon
CASB

Tools to Manage Cyber Risk in a Growing Organization

Cyber Risk in a Growing Business Within the cyber security industry, it is well known that as a company grows, so does its attack surface. This trend lends itself largely to the fact that as more employees are hired, more company-owned machines (laptops, tablets, etc.) are distributed. The risk is that once a company-owned machine … Continued

read more
May 18, 2020 | by Ritika Bramhe
security operations center

How to Choose Incident Alert Management Tools for Your SOC

A security operations center (SOC) is the centralization of your security processes and tooling. It can enable you to monitor for, evaluate, and respond to incidents across your organization with increased efficiency and effectiveness. By centralizing your security efforts, you create greater visibility into your systems and can better analyze and detect threats. At the … Continued

read more
May 8, 2020 | by Ritika Bramhe
Maze Ransomware attack

Maze Ransomware Attack Hits Cognizant

New Jersey-based service provider Cognizant is the latest victim of the Maze ransomware attack. This is an unfortunate reality check, proving that hackers don’t stop their calculated, malicious activities for COVID-19. Accordingly, managed service providers (MSPs) are still largely vulnerable to these malicious crimes. This post provides insight into the latest Maze ransomware attack, followed … Continued

read more
January 23, 2020 | by Gilad Maayan
How Threat Intelligence Can Improve Your Security

How Threat Intelligence Can Improve Your Security

A new cyberattack occurs roughly every 39 seconds. Each of these attacks leaves behind a variety of evidence, including IP addresses, log events and malicious files. This evidence can be incredibly valuable to security teams but only if it’s analyzed and placed in context. There is simply too much attack data from too many sources … Continued

read more