Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Unraveling the State of Kubernetes Security in 2024

We explored the Red Hat State of Kubernetes security report 2024, one of our favorite yearly reports. It’s jam-packed with incredibly fascinating information about one of our favorite subjects—Kubernetes security. Imagine that! In this post we’ll review some of the more interesting data points and contrast them with results from prior years. We’ll also discuss our own perspectives and observations on how this affects you as a Kubernetes user.

EQT to acquire a majority stake in Acronis, Acronis continues to expand its platform for MSPs

Acronis is excited to announce that EQT, the largest European private equity firm, will acquire a majority stake in our company. The partnership between Acronis and EQT, the global investment organization, builds upon a shared growth vision, commitment to accelerating the expansion of its platform, and continued strong focus on customer service. The founders, management, and existing investors will remain significant minority shareholders.

A brief introduction to Industrial Control Systems and Security

You may not know it, but much of your daily life depends on Industrial Control Systems(ICSs). From the power you're using right now to the water you drink, it all depends on Programmable Logic Controllers (PLCs) and other ICS tech to be delivered. In fact, nearly any time something in the physical world needs to be automated, there will be an ICS involved.

Wiz and Netskope: Making IaaS Zero Trust Magic

Netskope and Wiz help organizations simplify and automate policy management across complex cloud environments. This partnership highlights the seamless integration between Wiz sharing security risk and threat insights to enable Netskope to modify existing policies or craft new ones automatically. Below, we present two of the primary use cases that customers leverage with our joint integration.

Trustwave Managed Vulnerability Scanning Shines a Light on Vulnerabilities

The digital landscape constantly shifts, presenting exciting opportunities and lurking threats for businesses of all sizes. In this ever-evolving environment, maintaining a secure network is no longer a luxury; it's a necessity. However, achieving true security requires more than just firewalls and antivirus software. It demands a comprehensive understanding of your network's vulnerabilities – the chinks in your digital armor that attackers could exploit.

2024 State of Secrets Report

With the rise in collaboration apps like Slack, GitHub, and ChatGPT, it’s easy for employees and customers alike to share secrets in messages, files, repos, and other places where they shouldn’t be shared. Though this so-called “secret sprawl” may seem trivial at first, all it takes is one misplaced password or API key for a threat actor to escalate their privileges and access your organization’s crown jewels: Your data.

AI Tools Have Increased the Sophistication of Social Engineering Attacks

The Cyber Security Agency of Singapore (CSA) has warned that threat actors are increasingly using AI to enhance phishing and other social engineering attacks, Channel News Asia reports. The CSA’s report found that cybercriminals are selling tools that automate these attacks, allowing unskilled threat actors to launch sophisticated attacks.

Supercharge your investigation with Sysdig Sage for CDR

Artificial intelligence has taken over almost every aspect of our everyday lives. In cybersecurity, generative AI models with natural language processing are commonly being used to predict, detect, and respond to threats. But AI security assistants, although an upgrade from traditional machine learning, only provide very basic queries and summarization, which is insufficient to fully comprehend modern cloud attacks. As part of an ongoing effort to improve the cloud detection and response (CDR) experience,