Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

The 3 Ways That Data Brokers End Up With Your Information

Keeping up with privacy today is challenging, especially with so many ways your information can be shared and sold without you knowing. Data brokers collect a lot of personal information from different places. They gather details from your online activities, buying habits, and social interactions, then sell this information in a market that values data over privacy.
Featured Post

Taking a Threat Adapted Approach to Vulnerability Management

As cyber threats continue to grow in complexity and frequency, vulnerability management requires more than just patching systems; it demands a dynamic, threat-adapted approach. As part of Cyber Rhino Threat Week (9-13th of December 2024) which aimed to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem, we held a session that explored how integrating Threat Intelligence into Vulnerability Management can transform the way organisations prioritise and respond to risks.

Trustwave SpiderLabs: Ransomware Attacks Against the Energy and Utilities Sector Up 80%

The energy sector is a cornerstone of national security, ensuring the delivery of critical infrastructure services and supporting transportation systems. Recognizing the importance of protecting this vital industry, Trustwave SpiderLabs has released the comprehensive 2025 Trustwave Risk Radar Report: Energy and Utilities Sector.

11:11 Systems Receives Prestigious 2024 Zero Trust Security Excellence Award

The Greek philosopher Aristotle once remarked, “Excellence is never an accident. It is always the result of high intention, sincere effort, and intelligent execution.” When you’re winning, the thrill is undeniable. Success, whether in the casino or on the basketball court, requires focus and discipline. It’s a feeling like no other when everything finally clicks.

Stop Demonizing CVSS: Fix the Real Problem

If you read the newest risk-based vulnerability management literature, it appears we have a new favorite punching bag: the Common Vulnerability Scoring System (CVSS). You seemingly can’t throw a rock into the “vuln-o-sphere” without hitting someone dunking on CVSS or the National Vulnerability Database (NVD). The argument goes something like this: “Exploitation rates are up, ransomware is surging, and vulnerabilities are multiplying like rabbits.

Synchronize Jira Data Center Issues With GitGuardian Incidents

We are happy to announce that our new integration empowers Jira Data Center users to synchronize their GitGuardian incidents with Jira Data Center issues. We have previously integrated with Jira Cloud for issue creation and coordination, but now anyone running their own Jira Data Center installation can reap the same benefits of both automatic and manual creation of Jira issues from your GitGuardian incidents using customized templates. With our auto-resolve feature, you can automatically close GitGuardian incidents when the corresponding Jira issue is closed.

Is This the Ultimate Fix for Infosec Challenges? Decoding Zero Trust #cybersecurity

Is your infosec team overwhelmed by data sprawl, alert fatigue, and endless security challenges? Discover how Fidelis Security's Elevate solution can transform your approach with: Network Data Loss Prevention (DLP) Comprehensive Visibility Risk Profiling Powerful Detection, Response, and Analytics It’s time to stop struggling and start securing. Watch now to learn more!#ZeroTrust.