Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Continuous Threat Exposure Management (CTEM): A new era in proactive cyber defense

Do we need a new cybersecurity framework? According to Gartner, the answer is yes. Since 2022, they have championed CTEM, a five-stage approach designed to shrink attack surfaces and minimize cyber threat exposure through continuous risk assessment and mitigation. At its core, CTEM advocates for regularly testing your defenses to find vulnerabilities in your system and fortify your organization’s security with risk mitigation strategies.

PAM Essentials: A breakthrough in secure access solutions

We're excited to announce new capabilities of One Identity’s Cloud PAM Essentials, launched in March 2024, featuring our innovative Secure Gateway secure tunnel solution. This groundbreaking product offers a VPN-less solution designed to provide secure, seamless access to your critical resources. The journey from initiation to market release took just nine months, a testament to our team's dedication and efficiency.

Nightfall AI vs. Google DLP

In today’s cloud-based work environments, it’s all too easy for assets with sensitive data like PII, PCI, PHI, secrets, and intellectual property (IP) to be sprawled across the enterprise tech stack. With the skyrocketing costs of data breaches, one sprawled secret can cost organizations an average of $4.45 million. This is where Data Leak Prevention (DLP) solutions come in to limit secret sprawl, prevent data leaks, and ensure continuous compliance with leading standards.

Why the World's Top MSSPs are Ditching Legacy SOAR for Hyperautomation

Managed Security Service Providers (MSSPs), desperate to automate repetitive tasks, initially turned to SOAR to reduce their workload and improve threat response times. Unfortunately, legacy SOAR tools still face scalability, flexibility, and integration challenges. As the complexity and volume of cyber threats continue to grow, the limitations of legacy SOAR have become more apparent, necessitating the move towards more advanced automation technologies like Torq Hyperautomation.

Rapid Data Heist: Akira Ransomware Group's Two-Hour Attack on Veeam Servers

In a startling development, the Akira ransomware gang has demonstrated a dramatic reduction in the time it takes to exfiltrate data from compromised servers. According to the BlackBerry Threat Research and Intelligence Team, this cybercriminal group managed to steal data from a Veeam server in just over two hours during a June attack on a Latin American airline.

Crypto Exchange Bybit Integrates Fireblocks Off Exchange

Fireblocks Off Exchange enables businesses across the world to trade on centralized exchanges without introducing counterparty risk. Today, we’re proud to share that Bybit is the newest exchange to integrate with Off Exchange. Bybit, a crypto exchange ranked the second-largest in the world, joins Deribit, with further integrations to follow. These include BIT, Bitget, Coinhako, Gate.io, One Trading, and OKX.

Detect SSRF attacks in cloud applications and APIs

APIs can be vulnerable to a wide variety of attacks, such as poor inventory management and access controls, making them a primary target for attackers. Server-side request forgery (SSRF) is one type of attack that has become more prominent with the rising use of public clouds. This is primarily due to new development practices like using Instance Metadata Services (IMDS) to access valuable information about deployed instances, such as credentials.