Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The 11 Best Encrypted Cloud Storage Solutions 2024

No matter what information is being transmitted online, whether you send files, text messages, or upload files to back up in the cloud, the only way to guarantee secure data transmission is by using encrypted services. Encrypted cloud storage is the best method to store your files securely. However, not all cloud services offer the same levels of encryption, resulting in a less private storage method.

Safeguarding Your Collaboration Tools: Tackling the New Favorite Targets of Attackers

Secrets in collaboration tools are becoming prime targets for attackers. Reduce your attack surface by extending GitGuardian automated secrets detection capabilities to Slack, Jira, Confluence, or Microsoft Teams. Ensure security wherever your teams collaborate!

How to Stop Data Leaks in Their Tracks

Data leaks are a growing concern for organizations due to the rising volume of sensitive information stored digitally. Leaks occur when sensitive data is inadvertently exposed, and they can easily lead to cyber attacks, reputational damage, and enormous financial costs. The best way to protect against them is to stop them from occurring in the first place. In this blog, we’ll delve into the common causes of leaks and best practices to bolster data security and prevent data leaks effectively. ‍

Australian Cyber Security Strategy for Hardening

Australia aims to be the world leader in cyber security by 2030 using the Australian Cyber Security Strategy that was released on 22 November 2023. With the cost of cybercrime on Australian businesses growing by up to 14% per annum, the Cyber Security Strategy seeks to improve cyber security, manage cyber risks and better support citizens and Australian businesses to manage their cyber environment by using six cyber shields and actions to be taken.

IP Address Alert Investigations: Correlating and Mapping with MITRE ATT&CK

An Internet Protocol (IP) address is the digital equivalent of your home address. Your home has a unique identification number that gives information about your physical geographic location, like road, city, state, and country. An IP address provides similar information about the people and devices connected to a network.

Continuous Threat Exposure Management (CTEM): A new era in proactive cyber defense

Do we need a new cybersecurity framework? According to Gartner, the answer is yes. Since 2022, they have championed CTEM, a five-stage approach designed to shrink attack surfaces and minimize cyber threat exposure through continuous risk assessment and mitigation. At its core, CTEM advocates for regularly testing your defenses to find vulnerabilities in your system and fortify your organization’s security with risk mitigation strategies.

CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the ending was far more devasting. More than 100 organizations were exposed, and many are now grappling with the impacts of data theft and extortion in what some are calling one of the largest breaches in history.

Looking for a Job in Cyber? Tips and Advice From the Pros

A career in cybersecurity can be rewarding, challenging, and, frankly, lucrative. But it's not the easiest industry to break into: the skills required for a cybersecurity role are both niche and specific, the bar for entry is relatively high, and there are very few entry-level jobs available. But don't be disheartened. The cybersecurity industry is crying out for fresh talent. With hard work, a little luck, and the right advice, you can set yourself up for a long and satisfying career in cybersecurity.

Fortressing the Legal Frontier: Why SASE is Essential for Law Firms in the Age of Cyber Warfare

Guest blog by Jaye Tillson, Field CTO, Distinguished Technologist, HPE Aruba Networking The legal profession has long been a custodian for a significant of sensitive data. From mergers and acquisitions to intellectual property disputes, law firms hold the keys to a kingdom of confidential client information. However, in the digital age, this crown jewel has become a prime target for cybercriminals.