Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Lessons from a Honeypot with US Citizens' Data

Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work investigating potential risks and threats to the election system, from disinformation campaigns to nation-state actors looking to exploit vulnerabilities. No information that may have potentially affected the election process was discovered at any time during the research. If it had, Trustwave SpiderLabs would have immediately disclosed its findings to the proper authorities.

Pegasystems Consolidates Endpoint, Identity and Cloud Security with CrowdStrike

Pegasystems, a global leader in AI-powered decisioning and workflow automation, is a strategic partner for many of the world’s leading brands. The company’s role as an enterprise software provider means it often operates under the radar of the general public — but that doesn’t shield it from cyberattacks. Upon joining Pegasystems (Pega) in 2019, Director of Corporate Security Operations Steve Tieland quickly realized the company's legacy antivirus solution was missing the mark.

How to Augment Creative With AI: Using RAG for Generative Art and Design

In the rapidly advancing field of artificial intelligence, innovative techniques like Retrieval Augmented Generation (RAG) are revolutionizing how AI systems generate content. RAG, a powerful approach that combines knowledge retrieval with language generation, has the potential to transform various domains, including generative art and design. This article explores how RAG can augment creativity in AI, focusing on its applications in generative art and design.

What Are the Key Features of the Best Membership Website Builders?

A membership site is one great way to monetize your content, build a community, or offer exclusive products and services. When setting up a course platform, a subscription service, or a niche community, the right membership website builder is crucial to its success. But among all the options from a membership website builder, which best fits you? Here, we discuss what features to look for in a membership website builder so you can determine whether the website will have the tools it needs to reach its full potential.

Nation-State Threat Actors Rely on Social Engineering First

A new report from ESET has found that most nation-state threat actors rely on spear phishing as a primary initial access technique. In the second and third quarters of 2024, state-sponsored APTs from China, Russia, Iran, and North Korea used social engineering attacks to compromise their targets. Iranian threat actors continued conducting cyber espionage against countries across the Middle East, Europe, and the US. They also expanded their targeting to hit financial companies in Africa.

How Fidelis Network DLP Outsmarts Cyber Attackers

Data breaches and network security threats are becoming a major problem for companies. The goal is not only to detect attacks but to stop them from happening in the first place. Fidelis Network DLP gives businesses a strong and integrated system to protect sensitive data. By preventing data leaks across all network traffic, Fidelis Network DLP helps businesses protect themselves from both external cyber-attacks and insider threats.

How to Secure Your Digital Identity?

As everything is moving online these days, from shopping to healthcare, the need for stronger, more secure authentication methods has become important. This is especially true at a time when cases of identity theft have skyrocketed globally. Recent reports have shown that identity theft cases resulted in a whopping $23 billion in losses in 2023 alone. This indicates that both businesses and consumers are feeling the heat.

IT Security Terms: Regulations, Standards, Controls, Frameworks, and Policies - Where to Start!?

When tasked with the IT security of an organization, it can be easy to get bogged down in particulars and definitions and lose heart before you’ve even begun. With a plethora of terms to learn, details to secure, and moving parts to keep track of, building an effective cybersecurity strategy is no simple task. It requires a great deal of effort, planning, and coordination.