Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Keeper Launches Share Admin To Streamline Sharing Between Privileged Users

Keeper Security, the leading provider of zero-trust, zero-knowledge and FedRAMP Authorized cybersecurity software, today announces the launch of Share Admin, a powerful new feature for its award-winning Enterprise Password Management (EPM) Platform. Share Admin is a role-based permission that gives designated administrators elevated access rights over their organization’s shared folders and shared records.

Playing Hide-and-Seek with Ransomware, Part 2

In Part 1, we explained what Intel SGX enclaves are and how they benefit ransomware authors. In Part 2, we explore a hypothetical step-by-step implementation and outline the limitations of this method. Watch this live attack demo to see how the CrowdStrike Falcon® platform and the CrowdStrike Falcon Complete™ managed detection and response team protect against ransomware.

Why You Need To Update Your Software | Cybersecurity Awareness Month

Have you ever watched a scary movie where a young couple comes home to find the front door cracked open or windows thrown wide, curtains billowing in the autumn evening breeze? As the couple approaches the house, the tense music swells and we grip our armrests, struck by the terrifying realization that anyone — or anything — could be awaiting them inside.

Why Mitigate Flaws to Manage Risk: Advice from an Application Security Consultant

Documenting flaws that you don't prioritize today will save you time should they become high-severity flaws in the future. Here's the best way to approach them. The topic of mitigations is a commonplace source of questions and discussion for our Application Security Consulting group.

What is Vulnerability Remediation?

Vulnerability remediation is the process of finding, addressing, and neutralizing security vulnerabilities within an organization’s IT environment, which can include computers, digital assets, networks, web applications, and mobile devices. Remediation is one of the most important steps in the vulnerability management process, which is critical for securing networks, preventing data loss, and enforcing business continuity.

CrowdStrike Advances to Research Partner with MITRE Engenuity Center for Threat-Informed Defense to Help Lead the Future of Cyber Defense

CrowdStrike is now a Research Partner with the MITRE Engenuity Center for Threat-Informed Defense, joining a select list of cybersecurity companies and research foundations to take a hands-on approach to transforming state-of-the-art, threat-informed defense against sophisticated adversaries into a state of practice for organizations. Building on its previous role as Research Sponsor, CrowdStrike is reaffirming its commitment to fostering an open and collaborative security ecosystem.

The people have spoken and Splunk wins twice at the ITAwards

You know that us Splunkers love to go deep into use cases and figure out what helps our customers the most. However in today’s business world, industry recognition goes a long way in proving the value in the products and services we use. For example if you were Munich Airport, then it would speak volumes to others if your airport was named as a “First Five-Star Airport” or if you were Dachser Logistics and went on to win the “One Eaton Supplier Premier Award”.

ManageEngine recognized in the Gartner Magic Quadrant for Security Information and Event Management for the sixth time!

Today, we’re excited to announce that ManageEngine has been recognized in the 2022 Gartner Magic Quadrant for Security Information and Event Management (SIEM), appearing in the report for the sixth time in a row. We are thrilled to be awarded this recognition yet again for our contribution in the SIEM landscape. Get a complimentary copy of Gartner’s latest Magic Quadrant for SIEM here. The shift to cloud computing has accelerated in the last two years.

What are partner expectations regarding the growth of their managed cybersecurity services in 2022?

Cybercriminals are increasingly agile and organized – exploiting new technologies and tailoring attacks. The increasing complexity of cyber threats has driven the trend toward outsourcing one or more of an organization’s security operations.