Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Understanding the Difference Between BDRSuite and BDRCloud

When it comes to backup and disaster recovery, Vembu offers two robust solutions: BDRSuite and BDRCloud. While both are designed to deliver comprehensive protection for your data, they cater for different deployment preferences. BDRSuite and BDRCloud are cost-effective and comprehensive backup and disaster recovery solution offering.

Is Slack using your data to train their AI models? Here's what you need to know.

AI is everywhere—but how can you be sure that your data isn’t being used to train the AI models that power your favorite SaaS apps like Slack? This topic reached a fever pitch on Hacker News last week, when a flurry of Slack users vented their frustrations about the messaging app’s obtuse privacy policy. The main issue?

Understanding the NIS 2 Directive

By expanding its scope and introducing modernized requirements, the new NIS 2 Directive challenges organizations to elevate their cyber preparedness. This article explores how the directive affects a wide range of sectors and the critical infrastructure within them, detailing the requirements for compliance and highlighting the key role that IONIX plays in supporting organizations in meeting these regulations.

AI in Atlassian Tools - Benefits And Possible Risks

Artificial Intelligence is becoming an integral part of our work. It helps us be more productive by automating tasks, analyzing, and boosting the speed of our work. Due to the desire to accelerate work and make it more efficient, SaaS providers integrate AI into their software. For example, Atlassian in 2023 announced Atlassian Intelligence, a combination of state-of-art OpenAI models and the power and data within the Atlassian platform.

The Face of Cybersecurity Excellence: Jess Parnell Wins CISO of The Year

In the world of cybersecurity being proactive is a necessity. Cyber threats loom large, and only those who dare to innovate, lead, and push boundaries can truly make a difference. That’s why it’s no surprise that our very own Jess Parnell, has been named the CISO of the Year in the 2024 Cybersecurity Excellence Awards.

Automate Non-Human Identity Security and Management with Torq and Astrix

Organizations’ zero-trust policies and identity-centric programs ensure that user identities and login credentials are vigorously protected with IAM policies and security tools like MFA or IP restrictions. However, the situation is very different regarding non-human identities (NHI) like API keys, OAuth apps, service accounts, and secrets. Lack of visibility, monitoring, and governance of this permissive access is everywhere, and attackers have figured it out.

Optimizing Wireshark in Kubernetes

In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered abstraction of Kubernetes structures like pods, deployments, and services. Traditional tools like Wireshark, although powerful, struggle to adapt to these complexities, often capturing excessive, irrelevant data – what we call “noise.”

Predicting the Future of AI in Identity and Access Management

In the rapidly changing cybersecurity landscape, Identity and Access Management (IAM) is a critical pillar, safeguarding organizational data and access across different enterprise systems and platforms. As the head of CyberArk’s Artificial Intelligence Center of Excellence (AI CoE), I’m witnessing firsthand the transformative impact of artificial intelligence (AI) in this domain.

EPA Alert Warns Nation's Drinking Water at Risk: SecurityScorecard's recommendations for securing critical infrastructure

This week, the U.S. Environmental Protection Agency (EPA) warned that cyberattacks against water utilities across the country are becoming more frequent and more severe. The agency urged water systems to take immediate actions to protect the nation’s drinking water. According to the EPA, there are more than 150,000 public water systems across the U.S. serving over 300 million people—virtually all of which are administered and secured at local levels of government.