Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top tips: Cyberattacks to prepare for in 2024

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’ll look at three types of cyberattacks that are predicted to be prevalent in 2024. If there’s one thing we can be certain of, it’s that we will never ever be safe from cyberthreats. That is why we need to prepare ourselves for the onslaught of cybercrime that is about to hit us this new year.

Back to the Basics: Security Must-Haves for 2024, Part I

Welcome to 2024! A new year brings new change, so why not start 2024 with a rapid IT and security hygiene check? Read through the following list, keep a tally, and score your organization out of 10 on these mandatory items. If you don’t know the answer, it’s worth following up to find out.

Enhanced Collaboration: Internxt's Brand New File-Sharing Features

Now you can get even more out of your cloud storage subscription with Internxt, as we are excited to introduce Internxt Drive's new advanced sharing feature. This new update is designed to elevate and enhance how you collaborate and share files with others. Fresh out of Internxt's most successful year yet, Internxt continues to hit the ground running in 2024 by providing you with a new feature for Drive Web, designed to optimize how you manage, share, and secure your files.

Evolving ML Model Versioning

TL;DR: JFrog’s ML Model Management capabilities, which help bridge the gap between AI/ML model development and DevSecOps, are now Generally Available and come with a new approach to versioning models that benefit Data Scientists and DevOps Engineers alike. Model versioning can be a frustrating process with many considerations when taking models from Data Science to Production.

CRQ Journey Part 3: Communicable, Calibrated, Granular Results

My journey to finding Kovrr had been packed with headaches and puzzles that many CISOs still face today. Within a few short years of being the CISO at Avid, a content-creation software provider, I managed to implement tighter security controls and develop a framework that enabled objective progress measurement. ‍ However, I constantly faced an impasse when attempting to communicate these achievements with the board.

(Response) Splitting Up Reverse Proxies To Reach Internal Only Paths

When I’m carrying out security research into a thing, I generally don’t like to Google prior research right away. I know, this completely goes against how you would (and should!) carry out any research; starting with a literature review to find the lay of the land and existing research done in the area to then expand upon. However, I have a habit of getting that light bulb idea or concept and acting upon it right away, rolling up my sleeves and putting my wellies on, ready to get dirty.

Clearing the Fog of War - A critical analysis of recent energy sector cyberattacks in Denmark and Ukraine

The “fog of war” is a military term used to denote the uncertainty and confusion experienced on the battlefield. During periods of growing geopolitical conflict, it becomes increasingly hard to keep pace with new developments.