Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Harnessing Telemetry Data: Strategies for Success

Are you leveraging every piece of data to protect your network? Telemetry data is the automated process of collecting and sending data from remote points to an IT system for monitoring and analysis. Telemetry empowers companies to detect anomalies, predict potential breaches, and respond to threats faster.

Elastic integrates Anthropic's Claude 3 models to enhance AI-driven security analytics

For security analysts navigating an increasingly complex threat landscape, the ability to quickly identify and respond to attacks is critical. Security information and event management (SIEM) tools have been integral to helping security teams quickly respond to attacks. Now, in the era of generative AI, Elastic is changing the game by delivering AI-driven security analytics to replace SIEM and modernize the SOC.

The Human Element of Email Security: Understanding Behavioral Threats and Social Engineering

Behavioral threats and social engineering attacks target the human psyche rather than exploiting technical vulnerabilities. They rely on psychological manipulation, deception, and exploiting human trust to trick individuals into divulging sensitive information, clicking on malicious links, or taking actions that compromise security. Understanding these tactics and the human behaviors they exploit is key to effectively mitigating email security risks.

9 in 10 Organizations Paid At least One Ransom Last Year

New analysis of cyber attacks shows ransomware attacks are running far more rampant than previously thought, with half of organizations blaming poor cyber hygiene. After last year’s shocking stat that 70% of organizations pay the ransom, it’s really surprising to see that an even greater percentage (91%) have paid a ransom at least once in the last 12 months – this according to Extrahop’s 2024 Global Cyber Confidence Index.

KnowBe4 Earns Multiple 2024 Best Of Awards From TrustRadius

KnowBe4 is proud to be recognized by TrustRadius for our Security Awareness Training and PhishER platforms. KnowBe4's Security Awareness Training won in the Security Awareness Training category and PhishER won in Incident Response, Security Orchestration, Automation and Response and the Phishing Detection and Response categories.

The 2024 Cybersecurity Excellence Awards Recognizes archTIS Products as Winners in Data-centric Security and National Cyber Defense

archTIS is excited to share that the company has been honored with two significant awards in the 2024 Cybersecurity Excellence Awards. Our products, Kojensi and NC Protect, have been recognized in the National Cyber Defense and Data-centric Security categories. We are proud to be acknowledged by the Cybersecurity Excellence Award judges for our commitment to excellence, innovation, and leadership in cybersecurity.

K-12 Cybersecurity: The Growing Threat Schools Face

Classrooms have never been more connected. Many students are issued laptops or tablets instead of textbooks, while teachers and administrators rely on dozens of apps and connected devices like Smartboards to provide instruction, track grades, manage bus schedules, create budgets, and orchestrate countless other school-related activities.

Xalient achieves continued compliance with ISO 20000:2018 and expands scope to the Benelux region.

Xalient is proud to announce that it has successfully maintained its ISO 20000:2018 certification for Service Management in a recent audit, marking another milestone in its journey of operational excellence. This achievement, led by Craig Ingham, Xalient’s Group Information Security & Compliance Director, demonstrates Xalient’s dedication to providing high-quality IT services while successfully managing end-to-end service delivery.

Hey, You. Get Off of My Cloud

The Rolling Stones wanted to protect their space; we, as security practitioners, need to protect ours. Data 'castles' in the cloud are out there, and they're constantly under siege. By drawing inspiration from a band that embodied personal freedom, we can draw some – okay, very stretched - parallels to modern cloud security. Nonetheless, they work. And we all knew this blog was coming. And if you read the blog backward you can hear the name of the latest malware family... Maybe.

Removing Friction Between DevOps and Security is Easier than you Think

Removing friction between DevOps and Security teams can only lead to good things. By pulling in the same direction, DevOps can make sure developers continue to work with minimum interruption, while automation and background processes make security more effective and consistent than before. And, security teams have the visibility and understanding of the software development life cycle (SDLC), to improve developer experience and reduce risks and incidents for the organization.