Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Securing the edge with Zero Trust

The proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved traditional network boundaries. Today, the network perimeter has evolved as workloads have moved to the cloud while non-managed, mobile devices have become the norm rather than the exception. The location of applications, users, and their devices are no longer static. Data is no longer confined to the corporate data center.

The Power of Data: Calendar-based Policy Enforcement

A problem that is often discussed in the context of policy-as-code is how to get more people other than developers involved in policy authoring. Policy as code is still code, and while tooling and abstractions can help to some extent, the process still involves at least some level of development knowledge.

Cybersecurity Awareness Month Isn't Just for Techies: Tips for Everyone

This month marks the 18th year of Cybersecurity Awareness Month (CSAM) which focuses on helping provide individuals with resources they need to stay safer and more secure online. Now, more than ever, the overarching theme “Do Your Part. #BeCyberSmart” should resonate with everyone.

How Cloud SOAR mitigates the cybersecurity skill gap problem in modern SOCs

Even though the cybersecurity skill gap dropped for the first time in recorded history in 2020, it is still one of the most pressing problems in the industry. Demand continues to eclipse the supply of skilled cybersecurity professionals. The scarcity of qualified security workers with the right skill set, experience, and talent means that critical vulnerabilities turn many organizations into sitting ducks in the eyes of hackers.

SquirrelWaffle: New Malware Loader Delivering Cobalt Strike and QakBot

In September of 2021, a new malware family named SquirrelWaffle joined the threat landscape. It spread through infected Microsoft Office documents attached in spam emails. The infection flow starts with a ZIP file that contains the infected Office document. When the file is opened by the victim, the malicious VBA macros download SquirrelWaffle DLL, which eventually leads to deploying another threat, such as CobaltStrike or QakBot.

Ransom disclosure law would give firms 48 hours to disclose ransomware payments

Organisations who find their networks hit by a ransomware attack may soon have to disclose within 48 hours any payments to their extortionists. That’s the intention of the Ransom Disclosure Act, a new bill proposed by US Senator Elizabeth Warren and Representative Deborah Ross.

Do you use SolidWorks? Here's how you can protect your CAD files leveraging your existing investment in Microsoft

Dassault Systemes, SolidWorks is the most widely used solid modeling Computer-Aided Design (CAD) software that runs on Microsoft windows. Any industry that uses drawings, illustrations, designs, specifications, blueprints, prototypes, creatives, and models held in CAD is highly valued. In these industries, the exchange of information is both a necessity as well as a business risk.