Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Unlock Advanced Security Automation for Next-Gen SIEM

According to the CrowdStrike 2024 Global Threat Report, the fastest recorded eCrime breakout time was just 2 minutes and 7 seconds in 2023. This underscores the need to equip security analysts with modern tools that level the playing field and enable them to work more efficiently and effectively.

4 Examples of How AI is Being Used to Improve Cybersecurity

Throughout history, technology has been a catalyst for solving many civilizational problems. The advent of artificial intelligence (AI) presents an incredible opportunity to combat cybersecurity risks and bolster the defenses of organizational IT networks. The good news is that it’s already making an impact by reducing the average dwell time of cyber attacks by as much as 15%. But AI holds much more promise.

Shielding Your Storefront: How SASE Protects Retailers in a Digital Age

Written by Jaye Tillson, Field CTO, Distinguished Technologist, HPE Aruba Networking The retail industry is undergoing a digital revolution. From online shopping with one-click purchases to in-store kiosks offering personalized recommendations and mobile point-of-sale systems allowing for seamless checkout. As a result of this interconnectedness, customer data is flowing across a complex and ever-expanding network, which is beneficial for convenience and customer experience.

Vacation-Themed Scams Are Spiking

Scammers are now impersonating legitimate services like Booking.com and Kayak to target people planning their summer vacations. One out of every 33 vacation-themed domains registered last month was malicious, researchers at Check Point warn. “In May 2024, Check Point Research (CPR) detected a significant surge in summer-related cyber scams, highlighting the need for travelers to stay informed and proactive in safeguarding their personal information,” the researchers write.

What is Red Teaming: Benefits, Process, & Cost

Traditional security measures often fall short of measuring the dynamic modern-day threats. This is where red teaming comes in, a powerful approach that simulates real-world attacks to identify and address security gaps before they can be exploited. Standard red teaming tools are crucial in mimicking real attackers’ actions and uncovering vulnerabilities.

Teleport 16

It’s that time again — for a brand new major release. Our team releases major versions of Teleport every 4 months. Here we introduce Teleport 16. This post goes into detail about Teleport 16 breaking changes, bug fixes and improvements. In Teleport 16, we focused on new features and enhancements to enable our customers to implement mitigations to protect against an IdP Compromise.

Understanding the Cyber Risks in Video Communication

With the surge in remote work and virtual meetings, video communication is crucial for businesses and individuals. However, this convenience comes with significant cyber risks that can compromise sensitive information and privacy. Therefore, this article explores the common cyber threats in video communication and provides strategies to mitigate them.

Meeting the 555 Benchmark

How long does it take your security teams to detect a potential threat, correlate relevant data, and initiate a response action? The 555 Benchmark for Cloud Detection and Response challenges organizations to detect a threat within 5 seconds, correlate data within 5 minutes, and initiate a response within 5 minutes. It is not just something you can implement or use to solve your cloud security struggles. It is about testing and improving your cloud security operations and processes.