Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A Treacherous Dinner Party: The Global Effort to Maintain Supply Chain Security

…In the world of supply chain security, vigilance is your best friend. Stay informed, stay alert, and always prioritize security in your decisions. After all, in this interconnected digital world, we’re all in this together.

Complexity of Attack Surface Management in Cloud Environments

Legacy attack surfaces were small and simple. There were fewer servers and endpoints to protect. The tooling required to secure it was basic – perimeter firewalls, antivirus software, and server/network/application monitoring tools. When organizations migrate to the cloud, things change and become complex. For starters, on-premise infrastructure and applications can’t be left out in favor of the cloud. Most organizations run hybrid setups.

Rubrik and Pure Storage Join Forces to Deliver Complete Cyber Resilience of Mission-Critical Data

Data has become organizations' lifeblood. However, with the exponential growth of data comes unprecedented challenges in securing it across both short-term and long-term storage. To make matters worse, cyber threats are evolving rapidly, and businesses need robust solutions to safeguard their critical data. We're excited to announce a groundbreaking partnership between Rubrik and Pure Storage.

Trustwave SpiderLabs' Red Team Flight Tests Microsoft Copilot

The advent and widespread acceptance of Large Language Models (LLMs), such as Microsoft Copilot, by organizations and even average consumers has created another surface threat area that cybersecurity teams must come to understand. To help with this process, Trustwave SpiderLabs conducted a Red Team exercise against a licensed version of Microsoft Copilot.

CDK Ransomware Attack: What It Is and How to Protect Your Business

Software platforms are being used more and more by companies to run their operations, store private data, and talk to customers. Ransomware attacks are becoming more common because people depend on them so much. One of the scariest types of hacks is the CDK ransomware attack, which is aimed at companies that use software from CDK Global.

The Risks of Storing Your Passwords in Google Sheets

There are several risks associated with storing your passwords in Google Sheets, including its lack of end-to-end encryption by default and lack of secure sharing capabilities. While Google Sheets uses a secure type of encryption, it does not use end-to-end encryption automatically, meaning anyone at Google can view your files. It is risky to store information as important as your passwords in Google Sheets because the software is not designed to be a password manager.

Splunk SOAR Evolved: A Unified TDIR Approach to Automation

In a world where attackers are continually devising more sophisticated ways to breach enterprises, the value of automation has become critically important. To make matters worse, today's SOC is grappling with swivel chair movement across various security products, which sometimes includes a standalone automation product.