Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

ISO 27001 Audit Checklist: What Can You Expect?

The full process for achieving ISO 27001 compliance is lengthy, expensive, and difficult. While you can take many steps to make it easier, faster, or cheaper, there’s only so much you can sidestep the ground-level legwork that needs to be done to succeed. Fortunately, we can help you smooth out the process. A few weeks ago, we published a checklist for the full process to achieve ISO 27001 certification.

CrowdStrike Named a Leader in 2024 Frost Radar for Cloud-Native Application Protection Platforms

Frost & Sullivan has recognized CrowdStrike as a leader in its Frost Radar for Cloud-Native Application Protection Platforms (CNAPP) for the third consecutive year. CrowdStrike Falcon Cloud Security continues to set the standard for securing hybrid and multi-cloud environments, as evidenced by our placement at the forefront of both the Innovation Index and Growth Index.

Why Controversial Phishing Emails Do Not Work

Frequently, when a cybersecurity training manager sends out a controversial simulated phishing attack message that angers a bunch of employees and ends up making headlines, we get called by the media to comment on the story. Here are some examples of potentially controversial simulated phishing messages: I have read many stories of security awareness training managers sending simulated phishing emails with these types of messages, often around Christmas or other national holidays.

Fighting Ransomware: Using DLP Solutions to Protect Your Organization

Ransomware has evolved over the years and is now targeting organizations of all sizes with both file encryption and information exfiltration. In 2024, 59% of organizations experienced at least one ransomware attack, costing them billions in losses from damage, downtime, and data loss. Though firewalls and antimalware programs have their merits, they alone cannot provide protection from both data encryption and theft.

It's Typhoon Season: Attackers are deliberately evading EDR. What can you do about it?

Over the past year, several sophisticated cyber-espionage campaigns have grabbed the attention of our industry and challenged defenders and vendors alike with advanced tactics, techniques, and procedures (TTPs). One of the most visible campaigns is Volt Typhoon, named by the Microsoft threat intelligence team in May 2023 and attributed to Chinese state-sponsored threat actors.

New Measures Signal Progress for Stalking Victims in the UK

The Home Office has introduced new guidance aimed at strengthening protections for stalking victim-survivors in England and Wales. Under the updated measures, police will be required to inform individuals if they uncover the identity of a stalker, including those operating anonymously online. Additionally, stalking protection orders will be toughened to prevent convicted stalkers from contacting their victims while in prison.

Building a Scalable Permissions Service: Overcoming Challenges in Access Control

Permissions are at the center of every operation at Egnyte. Every interaction any user has with the system is bound to go through a stringent permission check,be it creating a file, copying it, moving it, sharing it, deleting it or using an operation as simple as adding comments. The permissions model is extremely crucial as without it, data leaks, incorrect access escalations, and unauthorized operations can occur.

The Rise of Phishing Attacks: How New Domain Extensions Are Fueling Cyber Crime

In recent years, the world of cybersecurity has witnessed a concerning trend: a significant increase in phishing attacks. A new study reveals that these attacks have surged by nearly 40% in the year ending August, 2024. What's particularly alarming is the role played by new generic top-level domains (gTLDs) in this spike. While gTLDs like.shop, .top, and.xyz make up only 11% of new domain registrations, they account for a staggering 37% of reported cybercrime domains.