Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

7 Steps for Developing a Data Breach Response Plan

Data breaches are a constant threat these days. One click on a malicious link could send tons of customer information flying out the window. Even with all the strategies and tools to prevent them, unauthorized people keep gaining access to sensitive data. So, maybe it’s not a matter of whether your company will ever experience a data breach but about when. The million-dollar question is: will you be ready to respond effectively against hackers when the time comes?

Homing the Cyber Risk Analysis Lens: Exploring Macro to Micro Trends

‍The process of achieving goals, whether long-term, short-term, personal, or professional, starts with harnessing the available relevant data. In fact, the more information gleaned beforehand, the more likely the mission will be a success. However, the details required for devising an effective plan exist at various granular levels, some overarching, focusing on the broader elements, and others more minute.

Data breach vigilantes: CIAM and IGA for customer data protection

In today's digital battleground, it seems like a week doesn’t go by where we don’t hear about some kind of data breach involving identity security. It's easy to become desensitized to the constant stream of identity security compromises. Yet, beneath the surface, a silent war is waged against the very essence of our online identities. Each breach is a battle fought on the front lines of cybersecurity.

What is the MITRE ATT&CK

The MITRE ATT&CK framework provides the cybersecurity community with information on more than 100 threat actor groups and the platforms they target. The data within the framework comes from publicly available cyber threat intelligence and reports and security teams and threat researchers. ATT&CK is available for free to anyone who wants to use it.

Lock pages in memory - and throw away the key

This Windows policy specifies which accounts can keep data in physical memory, preventing the system from paging it to virtual memory on disk. RAM (Random Access Memory) and virtual storage serve as two types of memory in a computer system, each with distinct functions and characteristics. RAM, the physical memory installed in a computer, provides fast access to actively used data by the CPU, determining the system’s multitasking capabilities.

Integrating Snyk Code SAST results in your ServiceNow workflows

Application security teams often lack the crucial information and visibility needed to find, prioritize, and remediate risks in their most business-critical applications. To solve this application security challenge, ServiceNow and Snyk have partnered to provide a singular view of the risk within these applications — exposing the severity and criticality of vulnerabilities while providing actionable workflows to boost your overall security posture.

Cato CTRL Issues New SASE Threat Report

Threat actors are always evolving. Whether it is nation-state actors, cybercrime groups, ransomware gangs, or niche teams targeting specific systems – new tools, techniques, and procedures are constantly introduced by attackers. Stopping those threats is challenging in large part because Cyber Threat Intelligence (CTI) remains fragmented.

What Is Security Automation?

Digital transformation initiatives like moving servers to the cloud, extending work-from-home privileges, and deploying more IoT devices have expanded attack surfaces, making it easier than ever for threats to slip through. At the same time, the number of cyber threats is growing fast. According to Security Magazine, a cyberattack now happens at least every 39 seconds.