Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Kill Switch - A Look into a Hackers Methodology

We’re kicking off a new series of blogs featuring some of the best live and recorded content from our consultants with Alex’s ‘The Kill Switch’ talk as seen at the Future of Cybersecurity Event. Alex talks us through a hackers methodology. Focusing on threat sources, threat actors and how to analyse said threats. He then walks through the methodology known as ‘The Kill Chain’.

CrowdStrike Falcon Proactively Protects Against Wiper Malware as CISA Warns U.S. Companies of Potential Attacks

CISA recently advised U.S. business leaders to protect their companies from destructive malware that has been seen targeting Ukraine. This emphasizes the importance of having the right technologies in place. The automated detection and protection capabilities of the CrowdStrike Falcon platform protect customers from this malware, provide them with visibility into their environments and allow for intelligent monitoring of cloud resources.

Gartner SOC Model Guide: Find the Security Operations Center Model That Best Fits Your Needs

Strong, resilient security operations require the proper melding of people, technology, and processes to achieve the goal of reducing the likelihood and impact of cyberthreats. The right security operations center (SOC) will strengthen the overall security resiliency of an organization. The wrong one will tax your team—leading to mistakes, breaches, and losses.

What is Third Party Due Diligence? What You Should Know

Due diligence is one of the most important steps before starting a partnership with a third-party business, as it reveals any hidden risks or vulnerabilities that could harm your network. In this blog, we will define third-party due diligence, explore the benefits of conducting cybersecurity due diligence, and describe how to get started.

CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit

On Jan. 18, 2022, researchers found a heap base buffer overflow flaw (CVE-2022-0185) in the Linux kernel (5.1-rc1+) function “legacy_parse_param” of filesystem context functionality, which allows an out-of-bounds write in kernel memory. Using this primitive, an unprivileged attacker can escalate its privilege to root, bypassing any Linux namespace restrictions.

6 Tips for Supply Chain Risk Management in 2022

Forrester recently predicted that in 2022, 60% of security incidents would involve third parties. Yikes! With such a large percentage of incidents taking place outside the confines of their organizations, corporate leaders need to know what to do to protect their business. So, here is a list of items to address to succeed at supply chain risk (SCR) management.

Sponsored Post

New Security Reference Stack For Modern Enterprise

The security stack is a crucial part of any company’s IT infrastructure. However, Security teams increasingly report that traditional SIEM solution approaches are “costly, complex, and resource-consuming,” according to a recent ESG survey. Fortunately, there has been significant innovation in how firms approach cybersecurity with new cloud-native technologies stack and breaking free from vendor lock-in and giving themselves more flexibility, cost advantage, and future-proofing.

ISR Q3 2021: 6 steps to reduce threat risk

The latest Internet Security Report, produced by the WatchGuard Threat Lab team, compiles analysis detailing malware evolution and trends based on data collected from 35,180 Firebox devices worldwide. Its key findings are as follows: This rate of incidents that the report has outlined for Q3 2021 does not seem to have decreased in severity in recent months. For these reasons, organizations should adopt several measures in order to be better prepared for upcoming threats.

3 Surprising Ways Ransom Attacks Could Destroy the 2022 Olympic Games

Though the level of fear of Covid 19 has diminished, there are other fears surrounding the 2022 Olympic games. Fears of telecom disruptions and ransomware attacks are founded, and the damage that could be caused has increased with the reliance on technology to broadcast the Games, which kicks off on February 4. Organizers are preparing for the kind of cyberattack that temporarily paralyzed IT systems ahead of the official opening ceremonies of the 2018 Pyeongchang Winter Olympics in South Korea.