Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Does IoT Contribute to Real-Time Grid Monitoring for Enhanced Stability and Fault Detection?

More decision-makers are investing in grid modernization efforts, knowing that doing so is necessary for keeping pace with modern demands. For example, smart grid fault-detection sensors could warn utility company providers of problems in real time, preventing costly and inconvenient outages. Technologies like the Internet of Things (IoT) can also improve stability. An IoT grid-monitoring approach allows authorized parties to oversee electrical infrastructure from anywhere.

Part 2: What cybersecurity measures can insurance companies and providers take to thwart cyberattacks like ransomware

As discussed in the previous blog, the insurance sector, like other financial institutions, face various unique cybersecurity challenges. Of primary concern is its responsibility for safeguarding sensitive customer data. This data has long been a prime target for cybercrime — a trend that has endured even as today’s IT landscape, and the threats against it, continue to evolve.

Comparing NGFW container firewalls with Calico container firewall

In my previous blog post, I touched upon some challenges with how NGFW container firewalls are built and how it takes a team of firewall specialists to deploy, configure and maintain the firewall platform. In this blog I will illustrate the challenges in detail and demonstrate the simplicity of the Calico container firewall platform.

The Ultimate Guide to Password Best Practices: Guarding Your Digital Identity

In the wake of escalating cyber-attacks and data breaches, the ubiquitous advice of “don’t share your password” is no longer enough. Passwords remain the primary keys to our most important digital assets, so following password security best practices is more critical than ever. Whether you’re securing email, networks, or individual user accounts, following password best practices can help protect your sensitive information from cyber threats.

How Telecom Providers Can Bolster Identity Security to Meet the UK TSA

As technology evolves, so do the threats that loom over our communication infrastructure. The rollout of 5G, the rise of artificial intelligence (AI) and our ongoing dependence on these networks combine to make the telecommunications industry a prime target for cyberattacks.

The Benefits of Using a Unified Platform for Incident Response

In today's rapidly changing cybersecurity landscape, swift and effective incident response is pivotal. Traditional incident response approaches, involving disparate tools and isolated processes, have proven inadequate to the task. That's where unified platforms come into play—a comprehensive approach to incident response that streamlines and centralizes the entire process.

CVE-2023-38547 & CVE-2023-38548: Two Critical Vulnerabilities in Veeam ONE

On November 6, 2023, Veeam published security hotfixes for two critical-severity vulnerabilities impacting Veeam ONE. At this time, Arctic Wolf has not identified active exploitation of either vulnerability, nor a published proof of concept (PoC) exploit. Although threat actors have not historically targeted Veeam ONE products, obtaining RCE on the monitoring and analytics platform will likely increase the potential for threat actors to create a working PoC exploit and attempt exploitation.

Monitor expiration events from Azure Key Vault

For customers using Azure Key Vault—which helps them safeguard sensitive keys and secrets used by applications and services hosted on Azure—it can be challenging to determine when the resources in their Key Vault(s) are about to expire. Invalid keys and secrets can disrupt your day-to-day workflows by causing application downtime, holding up incident investigations, invalidating compliance, slowing down the development of new features, and more.

Collect Google Cloud Armor logs with Datadog

As the internet continues to evolve, cybersecurity threats—particularly Distributed Denial of Service (DDoS) attacks—are an increasingly significant concern for organizations. In this post, we’ll look at how you can use Datadog to collect Google Cloud Armor (GCA) logs and detect and respond to potential DDoS attacks in real-time. But first, we’ll briefly cover what DDoS attacks are and how they work.

What is Adaptive Security (Definition and Implementation)

Adaptive security is an approach to cybersecurity that helps your Security Operations Center (SOC) quickly adapt to the latest threats. By implementing adaptive security, your organization can evaluate and analyze behaviors and events in real-time to take preventative action before a breach.