Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Supply Chain Security Snags

Picture a domino effect in the business world: one weak link in a supply chain triggers a cascade of disruptions. This is the reality of supply chain attacks, where a minor breach can escalate into a major crisis. It underscores the urgent need for robust security across the whole supply chain. Supply chain attacks represent a sophisticated threat to organizations, often involving multiple stages of exploitation.

Enhancing Compliance through Integrated Solutions: A Webinar with err0 & BoxyHQ

​Join us for an exclusive webinar where Deepak Prabhakara from BoxyHQ and Cesar Nicola from Blue Trail Soft (err0) unveil how integrating err0's error management solutions with BoxyHQ's Audit Logs can revolutionize compliance for companies. This free event is a must-attend for those seeking to fortify their compliance and security.

Netskope Cloud Exchange for Your Zero Trust Journey

Early in 2023 my colleague, and VP of Technology Integrations and Business Development, David Willis walked us through Realizing the True Power of Netskope Cloud Exchange. In the article, David painted the evolution of Cloud Exchange with a focus on how the Netskope Cloud Threat Exchange (CTE) module has matured since it was released.

Locking Up LockBit - The 443 Podcast, Ep. 281

🔒 🔴 This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover an international law enforcement takedown of the LokBit #ransomware group’s infrastructure. After that, they cover a novel #malware delivery vector involving an IoT “toy.” Marc and Corey end the podcast by covering the latest White House Executive Order addressing #cybersecurity in critical infrastructure.

What Are The Risks of a Quantum Apocalypse, and Should We Worry?

Apocalypse now? Later? Will it ever happen? Computers can solve many problems in our day-to-day lives, making working remotely, storing files, and connecting with people from across the globe significantly easier. But has the development of computing technology gone too far? The potential of quantum computers may lead to technical breakthroughs in machine learning, science, and healthcare, but these powers may come at a cost. Current computer systems are far less powerful than quantum computers.

Calculating the ROI of Effective Bot Management

Bots cost the average business 4.3% of online revenues every year – or $85 million for the typical enterprise – so it’s critical that businesses invest in finding the right bot protection solution. If you’re coming up against resistance within your business when seeking to procure or upgrade your bot protection capabilities, this post will give you plenty of ideas for proving why better bot management is essential – in ways that matter to everyone in your organization.

The Future of Kubernetes Network Policy

In the ever-changing world of Kubernetes security, it’s crucial to stay ahead of threats while maintaining operational efficiency. That’s why we’re excited to introduce our latest feature: Auto-Generated Kubernetes Network Policy, based on application runtime behavior, powered by eBPF (extended Berkeley Packet Filter) technology. With this addition, organizations can easily apply native Kubernetes network rules without worrying about disrupting their production systems.

Cloud Unfiltered with Cory O'Daniel on DevOps vs. Platform Engineering - Episode 4

Cory O'Daniel, CEO of Massdriver discusses his blog series, which contains the article entitled "DevOps is BS!". Find out why he and others are coming to the conclusion that this may be the case. Additionally, Cory discusses the need for a more consolidated approach to DevOps and how platform engineering may be the answer. Find Out: Find out this and more in the latest episode of Cloud Unfiltered.

Understanding the RSA-based Marvin Attack

The Marvin Attack, named after the vulnerability it exploits, poses a significant threat to systems relying on RSA encryption and signing operations. It's a variation of the Bleichenbacher attack, which exploits errors in PKCS #1 v1.5 padding to perform adaptive-chosen ciphertext attacks. The attack leverages timing information obtained from RSA encryption or signing operations.