Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Navigating VMware changes: How to minimize upheaval and keep your business moving forward (Webinar)

The word “disruption” gets thrown around a lot when discussing the tech industry. Disruptive technologies. Disruptive ideas. Disruptive companies and business models. Even “disruptive innovation” or its younger cousins, “big-bang disruption” and “new-market disruption.” The list goes on … and on.

Beware! These Are Some Major Active Directory Threats Lurking in Your Network

95% of Fortune 1000 organizations use Active Directory (AD) to organize their IT systems. This statistic emphasizes the relevance of AD in modern enterprise networks. AD, as a centralized database including user accounts, group objects, workstation objects, security information, and much more, is critical for managing and securing IT resources. However, the very capabilities that make Active Directory so important, also make it an ideal target for cyber criminals.

Data breach vigilantes: CIAM and IGA for customer data protection

In today's digital battleground, it seems like a week doesn’t go by where we don’t hear about some kind of data breach involving identity security. It's easy to become desensitized to the constant stream of identity security compromises. Yet, beneath the surface, a silent war is waged against the very essence of our online identities. Each breach is a battle fought on the front lines of cybersecurity.

Unlocking the Art of Possible: Exploring the ThreatQ Community

In cybersecurity, staying ahead of threats requires not only cutting-edge technology but also a collaborative community of experts. The Art of Possible isn’t just a concept; it’s a mindset that drives innovation, fosters collaboration, and empowers defenders to proactively address emerging threats. At the heart of this philosophy lies the ThreatQ Community, a dynamic ecosystem where security professionals unite to share knowledge, strategies, and best practices.

What Is Security Automation?

Digital transformation initiatives like moving servers to the cloud, extending work-from-home privileges, and deploying more IoT devices have expanded attack surfaces, making it easier than ever for threats to slip through. At the same time, the number of cyber threats is growing fast. According to Security Magazine, a cyberattack now happens at least every 39 seconds.

Cato CTRL Issues New SASE Threat Report

Threat actors are always evolving. Whether it is nation-state actors, cybercrime groups, ransomware gangs, or niche teams targeting specific systems – new tools, techniques, and procedures are constantly introduced by attackers. Stopping those threats is challenging in large part because Cyber Threat Intelligence (CTI) remains fragmented.

Enabling GenAI with AI-infused API Security

GenAI has the promise to transform companies, and introduce a lot of security risk. One of the main benefits of GenAI relates to the modernization of apps. Most companies are going through some type of app modernization. They are responding to the market by delivering better and better experiences to their customers. This is largely done through the experience people have with their apps. This ranges from banking to healthcare to travel and everywhere in between.

Next-Generation SIEM: Corelight is the Data of Choice

For years, the mantra for achieving visibility into potential threats has been the trio of EDR, NDR, and SIEM. These components form the foundation of a robust security posture, with EDR and NDR offering the depth and breadth needed to monitor activities across endpoints and networks.

HIPAA Compliance For Email

In the current era of digital technology, email has become an essential means of communication in the healthcare sector. It helps simplify processes, fosters teamwork, and enhances the quality of patient care. However, it is important that the confidential patient data is kept secure, and all communications are done as per the HIPAA compliance email procedures.

Building Generative AI Solutions At Egnyte

The rise of Generative AI models has sparked a transformative shift across industries, offering unprecedented capabilities in automating tasks, enhancing decision-making, and fostering innovation. As publicly available tools, these models promise a democratization of technology, suggesting that any company can leverage them to boost efficiency and creativity. However, the reality of integrating and optimizing these AI models for specific corporate needs is far from plug-and-play.