Palo Alto Networks Cortex XSOAR now has access to The Total Internet Inventory. ™
SecurityTrails’ 125,000 users can now integrate with the leading SOAR platform.
Digital Forensics: Sleuthing Against Cybercrime
While digital forensics may have come from a fairly dubious tradecraft background, it has grown to be a major part of many cyber crime investigations. Developments in the field in terms of research, tools and techniques have brought digital forensics to a whole new level.
SecurityTrails Acquires Asset Monitoring Provider Surface.io
ORLANDO, FL, September 14, 2021 - SecurityTrails, the Total Internet Inventory, announced it has invested in the enterprise-ready asset monitoring provider Surface.io in an effort to deliver continuous attack surface monitoring through their Attack Surface Reduction platform.
Security Information and Event Management (SIEM): History, Definition, Capabilities and Limitations
What began as a tool for helping organizations achieve and maintain compliance, security information and event management (SIEM) rapidly evolved into an advanced threat detection practice. SIEM has empowered incident response and security operations centers (SOC) analysts as well as a myriad of other security teams to detect and respond to security incidents.
nmapAutomator: Automating your Nmap Enumeration and Reconnaissance
The rise of reconnaissance tools in the last decade has been remarkable.
The 10 Largest Data Breaches and Leaks: Overview, Impact and Settlements
Today, every company holds some sensitive information that can be of value to malicious actors. To say that we now see cyber attacks and data breaches happen routinely would be an understatement. We’re hit almost weekly with news about attacks crippling entire fuel pipelines, exposing government and largest-enterprise networks to attackers, and personal information belonging to billions of people all around the world put up for sale on the dark web.
Experience Upgrade: SecurityTrails Product Redesign
Last week we announced the general release of SecurityTrails SQL. And today we’re excited to let you know that we’ve been working on improving the overall UX experience of many of our products with a new, unified design.
Intrusion Prevention Systems: Definition, Types, IDS vs. IPS
Every organization with a cybersecurity strategy has the goal of stopping cyber threats before they become real attacks and cause damage. Because of this, most cybersecurity strategies have turned to more proactive approaches, rather than relying only on reactive security measures.