Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Securing next-gen development: Lessons from Trust Bank and TASConnect

Today, the average application contains thousands of moving parts. Organizations deploy to multi-cloud environments with containers and microservices, using a combination of code written by internal teams, generated by AI, and curated by third parties. Security teams face a tall order in keeping these complex applications secure, especially given the increasing number of software supply chain attacks.

Wireshark: Ethereal Network Analysis for the Cloud SOC

Remember Wireshark from the good old days of your IT degree or early engineering adventures? Well, guess what? It’s still kicking and just as relevant today as it was back then, and guess what else? It is still open source! Do your engineering or security teams use it? There’s a good chance they do if you’re on-premises. Believe it or not, Wireshark isn’t just for the land of wires and cables anymore. With some help from Falco and Kubernetes, it has a place in the cloud SOC.

NEW in Elastic 8.14: Attack Discovery, GA of ES|QL, and AI Assistant features

Elastic 8.14 is now available! This release supports our mission to modernize security operations with AI-driven security analytics. 8.14 includes major features like the brand new Attack Discovery, significant enhancements to Elastic AI Assistant for Security, and the general availability of ES|QL — all of which provide the SOC with contextual, streamlined SecOps.

Policy Enforcement Redefined: Panoptica Integrates with Multi-Cloud Defense making it the first CNAPP solution to expand into Network Security

In the dynamic landscape of cybersecurity, the integration of cutting-edge technologies is paramount to stay ahead of evolving threats. In this pursuit, the fusion of Panoptica’s robust capabilities with Multi-Cloud Defense emerges as a game-changer. This groundbreaking integration not only fortifies organizations against multifaceted risks but also establishes a new paradigm in policy enforcement for unparalleled security.

Three Questions to Ask About Your Cloud Security Posture

For most organizations, the decision to adopt cloud technologies is a simple one. Cloud apps streamline operations and costs while enabling users to access resources from anywhere and on any device. But migrating to the cloud has also introduced some complexity, which comes with new risks. Instead of everything residing neatly within your corporate perimeter, your data now resides within countless apps and is being handled by users and endpoints that operate outside of your sphere of influence.

Delivering a Modern Approach to SaaS Security with Netskope One

There are more SaaS applications in use by businesses than ever before—and the adoption rate is only going to continue to increase. According to Netskope’s annual Cloud & Threat Report, SaaS adoption continued to rise in enterprise environments throughout 2023, with users constantly accessing new, mostly unmanaged, apps and increasing their use of existing apps.

First American Data Breach in December Impacts 44,000 Individuals

In an alarming revelation, First American Financial Corporation, the second-largest title insurance company in the United States, disclosed that a cyberattack in December resulted in a significant data breach affecting 44,000 people. This incident underscores the importance of robust cybersecurity measures and services such as phishing takedown, online risk evaluation, stolen credentials detection, and darknet monitoring.

An Introduction To Purple Teaming

With cyber threats constantly evolving, organizations must ensure that their approach to identifying and mitigating vulnerabilities is always up to date. Purple teaming can play a vital role in helping them to achieve this. Purple teaming involves red and blue teams collaborating on an ongoing basis to maximize their impact. Read on to discover how purple teaming enables businesses to enhance and accelerate their approach to identifying and mitigating security vulnerabilities.

Ultimate Guide to Vendor Risk Scoring

Vendor risk scoring is a critical component within vendor risk management (VRM) or third-party risk management (TPRM) programs and an organization’s overall risk management strategy. Risk scoring is an integral tool in the risk assessment process, helping organizations identify, evaluate, and mitigate potential risks associated with third-party vendors or service providers.

Life in Cybersecurity: From the Classroom to the Next Generation of Cybersecurity Professional

When you speak with many of the seasoned veterans of cybersecurity, it is not unusual to learn of the twisted path in technology that eventually landed them in the security profession. However, the newest cybersecurity professionals are digital natives. They grew up in a world of technology and were exposed to cybersecurity as early as their first interactions with the internet.