Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Train Your Own Classifier (TYOC) for Image Data Protection

Machine learning-based data loss prevention (DLP) file classifiers provide a fast and effective way to identify sensitive data in real-time, empowering organizations with granular, real-time DLP policy controls. Netskope Advanced DLP offers a wide range of predefined file classifiers, such as passports, driver’s licenses, checks, payment cards, screenshots, source code, tax forms, and business agreements.

RPC Endpoint Mapper Authentication and Hardening

This policy setting determines if RPC clients authenticate with the Endpoint Mapper Service when their call includes authentication data. The Endpoint Mapper Service on Windows NT4 (all service packs) is unable to process authentication data provided in this manner. Disabling this policy means RPC clients won’t authenticate with the Endpoint Mapper Service, but they can still communicate with it on Windows NT4 Server. The recommended state for this setting is: Enabled.

ChatGPT: A Tool for Attackers and Defenders

ChatGPT impresses everyone with its writing capabilities; however, its proficiency in understanding and generating human-like text has inadvertently empowered threat actors to produce realistic and error-free phishing emails, which can be challenging to detect. The use of ChatGPT in cyberattacks poses a significant threat, particularly for attackers whose first language isn’t English. This tool helps them overcome language barriers, enabling the creation of more convincing phishing content.

Ekran System Changes Name to Syteca

We are more, but we are the same. Ekran System Inc. is happy to announce that our company changes its name from Ekran System to Syteca. Following over a decade of continuous development and growth, we see that it’s now the time to expand our product and adjust its perception accordingly. In October 2024, we will take the first steps of transforming into Syteca by releasing a significant expansion of our core platform and changing our website domain from ekransystem.com to syteca.com.

Next-Gen Container Security: Why Cloud Context Matters

Container security has experienced significant transformation over the past decade. From the emergence of foundational tools like Docker to the maturation of orchestration platforms such as Kubernetes, the container security landscape looks different than it did even a few years ago. With Gartner predicting 95% of organizations will be running containerized applications in production by 2028, it’s clear that container security is going to be a key priority for most organizations moving forward.

Major Factors That Determine the Expense of Software Development Projects

Software development is a pain in the neck, especially when it comes to budget and cost estimation. It can be challenging to accurately estimate the budget required, which can intimidate business owners during the research phase. To help you navigate these challenges, let's explore the factors influencing the cost of developing software.

Renewable Energy Integration: Influence of NERC CIP Standards

The renewable energy revolution is in full swing, with sources like wind, solar, and storage facilities accounting for a remarkable 20% of total U.S. electricity generation in 2021. This rapidly growing sector, projected to reach a staggering $1.1 trillion globally by 2027, is set to reshape the energy landscape. However, as we embrace this sustainable future, an oft-overlooked yet critical aspect demands our attention: cybersecurity.

Enterprise Cybersecurity: A Guide to Ransomware Recovery

Believing that your organization is immune to ransomware is wishful thinking at best. Despite advancements in enterprise cybersecurity, the reality is that breaches are not a matter of if but when. Even the most sophisticated preventative measures can be circumvented by determined and resourceful cybercriminals, whose methods are constantly evolving. The fallout from a successful ransomware attack can be catastrophic.