Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

From alerts to insights: Establishing resilience with Recorded Future and Tines

Today’s security teams are faced with an overwhelming volume of alerts and data, making it difficult to respond quickly and effectively. Join us as we explore how Recorded Future and Tines help security teams streamline threat investigations, enrich alerts with actionable intelligence, and accelerate decision-making. During the webinar, we covered: From alert ingestion to enriched data analysis and remediation, discover the ways Recorded Future and Tines equip teams with the information to make faster, more informed threat-related decisions.

Why CASB Solutions Are Unsuitable for Detecting AI Usage in Organizations

Cloud Access Security Brokers (CASBs) are essential tools for many enterprises, acting as intermediaries between users and cloud services to provide visibility, enforce security policies, and ensure compliance. While CASBs excel at managing traditional SaaS (Software-as-a-Service) applications, they fall short when it comes to detecting and managing the use of AI tools within an organization.

How PAM Reduces Cybersecurity Risks in Remote Work Environments

When organizations adopt remote work, they face increased cybersecurity risks. Privileged Access Management (PAM) helps mitigate these risks by reducing the attack surface, minimizing insider threats, and providing enhanced visibility and monitoring capabilities. Continue reading to learn the cybersecurity risks unique to remote work environments and how PAM helps address them.

A Beginner's Guide to Service Accounts: What They Are and How To Secure Them

Service accounts are nonhuman privileged accounts used by systems or applications to perform certain tasks, access resources or run processes. These accounts are typically given only the permissions they need for a specific job. According to ReliaQuest, 85% of data breaches between January 2024 and July 2024 that organizations responded to involved compromised service accounts. To prevent the misuse of credentials, organizations should secure their service accounts.

Navigating AI Agent Security Amid Evolving Regulations

The landscape of artificial intelligence (AI) governance is undergoing significant changes, particularly as it relates to the rise of AI Agents—autonomous systems that can independently make decisions and execute tasks. Recently, a key executive order on AI safety was rescinded, which previously required developers to share safety test results with federal agencies and mandated comprehensive assessments of AI-related risks.

Cyber Resilience at 11:11 Systems with Kuashik Ray, Chief Experience Officer at 11:11

"The balance of proactive and reactive measures is how you get cyber resiliency. Cyber resiliency is equal to cybersecurity plus cyber recovery." Hear from 11:11 Systems' Chief Experience Officer Kaushik Ray on what cyber resilience at 11:11 means for our customers.

NIS2 is Here - Understanding the NIS2 Directive and Its Transposition Across Europe

The Network and Information Security Directive (NIS2 Directive) is an important piece of European Union legislation aimed at bolstering cyber security across the member states. NIS2 officially came into force on 17th October, and while some EU member countries have met this deadline, many are still working to fully transpose the legislation.

Introducing CelesTLSH: Advanced Malware Detection with Fuzzy Hashing

We are excited to announce the integration of the CelesTLSH Malware Scanner into the LimaCharlie ecosystem. Developed by Magonia Research, CelesTLSH enhances your security operations by scanning files collected via the BinLib extension. It identifies known malware and threat actor tools through advanced fuzzy hashing techniques.

CrowdStrike Researchers Explore Contrastive Learning to Enhance Detection Against Emerging Malware Threats

The process of crafting new malware detection features is usually time-consuming and requires extensive domain knowledge outside the expertise of many machine learning practitioners. These factors make it especially difficult to keep up with a constantly evolving threat landscape. To mitigate these challenges, the CrowdStrike Data Science team explored the use of deep learning to automatically generate features for novel malware families.