Resources
Learn about CYREBRO’s platform, technology, and capabilities, read about industry insights, watch webinars with cyber experts, and much more in the resources below.
-
Guides & E-books
7 Steps to Effective Incident Response
This guide is meant to help you take the first steps to creating an effective incident response plan. Every organization is different, so use this guide as a framework to create an incident response plan (IRP) that is uniquely tailored to your organization.
-
Threat Intelligence
GoDaddy Data Breach Affects 1.2M Costumers
GoDaddy, the web-hosting giant, has disclosed it has suffered from a data breach. The attackers have gained access to GoDaddy’s Managed WordPress hosting environment. Although the breach was discovered on November 17, according to GoDaddy’s investigation the attackers have infiltrated the systems on September 6. The attackers have gained access to the following information: Up…
-
Threat Intelligence
Cisco has released updates fixing critical RCE vulnerabilities
Cisco has released updates fixing multiple critical vulnerabilities in Cisco Policy Suite and Cisco Catalyst PON Series Switches Optical Network Terminal. Successful exploitation of the vulnerabilities may lead to Remote Code Execution and Full System Compromise. The Vulnerabilities CVE-2021-40119(CVSS 3.1: 9.8, Critical) A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system…
-
Guides & E-books
The Real State of DevSecOps and Where It’s Going
Get the ultimate 2021 DevSecOps guide to bolster the capabilities of your DevSecOps team. Find out about the challenges facing the field, what to watch out for, how to boost protection, and key takeaways regarding consolidation, compartmentalization, and accountability.
-
Podcast & Webinars
Maximize Your Existing Systems to Harden Your Security Posture
To combat the ever-growing threat of cyber-attacks from actors who are becoming more and more sophisticated, organizations are investing in DevSecOps to embed security deep into the development process. This also means that it’s also critical to stay on top of the quickly evolving DevSecOps tools and tactics.
-
Case Studies
Hedge Fund Case Study
The company is one of the top US hedge funds in the alternative investment space and invests in various public equity markets including financial, telecom, healthcare, and industrial companies, on a global scale.