Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Why Traditional EDRs Fail at Server D&R in the Cloud

In the age of cloud computing, where more and more virtual hosts and servers are running some flavor of Linux distribution, attackers are continuously finding innovative ways to infiltrate cloud systems and exploit potential vulnerabilities. In fact, 91% of all malware infections were on Linux endpoints, according to a 2023 study by Elastic Security Labs.

The biggest data breaches in history

A data breach can wreak havoc on an organization and can also have long-term consequences for those who have their personal information exposed. In this article, we'll outline the biggest cybersecurity data breaches in history, as well as a rundown of some of the more recent notable cybersecurity breaches. Data is the new currency, and cybersecurity breaches are a major threat to individuals and businesses.

Permissions Auditing in Microsoft 365 and SharePoint

Regularly reviewing user permissions is important to reduce the risk of data overexposure and breaches. Overpermissioned users pose a significant security risk. Restricting access to only necessary information for individuals to perform their jobs can significantly reduce risk. By conducting regular permissions audits in Microsoft 365 and SharePoint, organizations can ensure that sensitive information access remains appropriate, safe and secure.

Key learnings from the State of Cloud Security study

We recently released the State of Cloud Security study, where we analyzed the security posture of thousands of organizations using AWS, Azure, and Google Cloud. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can leverage Datadog Cloud Security Management (CSM) to improve your security posture.

Nextcloud Review: Is Self-Hosting Your Cloud Storage Worth It?

Many people may be surprised that you can host your cloud storage straight from the comfort of your home. If you knew this was possible, you may wonder which is the best self-hosting solution for you, and chances are you may be considering Nextcloud. If that’s the case, congratulations, you’re in the right place! If not, congratulations anyway for considering an alternative cloud provider and switching to a private cloud storage solution.

The Six Pillars of Cybersecurity

In the ever-evolving landscape of cloud computing, ensuring robust security measures has never been more important. In the new ISO 27001:2022 standard, there is a new requirement for organisations to establish control of their Cloud services, which includes every flavor of cloud from Software as a Service (SaaS) to Platform as a Service (PaaS). Amazon Web Services (AWS) is a leading cloud services provider.

From Shadow to Guardian: The Journey of a Hacker-Turned Hero

In the ever-evolving landscape of cybersecurity, the line between the defenders and attackers often blurs, with skills transferable across both arenas. It’s a narrative not unfamiliar to many in the cybersecurity community: the journey from black hat to white hat, from outlaw to protector. In the 15th episode of Cato Networks’ Cyber Security Master Class, hosted by Etay Maor, Senior Director of Security Strategy, we had the privilege of witnessing such a transformative story unfold.