Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

ZTNA: A Game-Changer for C-Level Executives

In today’s digital age, where work from anywhere and hybrid cloud adoption are the norm, traditional network security perimeters have crumbled. IT organizations are using hybrid cloud strategies to combine the scalable, cost-effective public cloud with the secure, compliant private cloud. However, on the user side, enterprises are grappling with the limitations of VPNs, which were once the go-to solution for secure remote access.

A New Era of Machine Identity Security: Welcome Venafi to CyberArk

We are thrilled to announce that we have completed the acquisition of Venafi, a recognized leader in machine identity management. This strategic move aligns with our commitment to not just protecting human identities but expanding our capabilities for securing the rapidly growing world of machine identities.

Kubernetes Monitoring Tools: Optimizing Performance and Security

Containerization is now an important tool for businesses that want to make their apps scalable and efficient. A lot of people use Kubernetes because it can easily manage containers in many different environments. It is the best open-source platform for handling containerized workloads and services. But Kubernetes systems can be hard to manage and keep an eye on because they are spread out and have changing workloads.

Celebrating Five Years as a Customers' Choice in Application Security Testing

We are thrilled to announce that, thanks to your support and trust, Veracode has been recognized as a Customers' Choice in the 2024 Gartner Peer Insights Voice of the Customer for Application Security Testing for the fifth consecutive year! We believe this distinction is not just a testament to our solutions and services but, more importantly, a reflection of the strong partnerships we have formed with each of you.

RCE Zero Day Vulnerabilities in CUPS Put Linux Systems at Risk

A new series of vulnerabilities in the Common Unix Printing System (CUPS) threatens numerous Linux systems, potentially allowing remote code execution (RCE). This affects a wide range of platforms, including Debian, Red Hat, SUSE and macOS. The vulnerabilities—tracked as CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177—are believed to endanger over 76,000 devices, with estimates suggesting up to 300,000 could be affected.

Why Microsoft is mandating MFA for Microsoft Entra ID and Azure

Starting on Oct. 15, 2024, Microsoft Entra ID, Microsoft Intune, and other Microsoft Azure applications will require users to sign in with Microsoft Entra MFA. With increasing threats of account takeovers and large-scale phishing attacks targeting Entra ID users, this looks to be a step in the right direction.

Multi-Region Redundancy for Stronger Data Resilience

Rubrik Cloud Vault already provides a high level of cyber resiliency against data deletion, encryption, and exfiltration through air-gapped, immutable, access-controlled backup and archival copies stored in an isolated environment. Now, for added resilience against regional failures and natural disasters, Rubrik Cloud Vault supports Zone-redundant storage (ZRS) and Geo-redundant storage (GRS), complementing our existing Local-redundant storage (LRS) option.

Data Security Best Practices for Cloud CRM Systems as Adoption Surges

For the past few years, the CRM market has witnessed steady growth and it is projected to reach $89 billion by 2024. Estimates are that this growth will continue into the foreseeable future. Essentially, CRM systems have come to stay and have become the backbone of many organizations. However, the bleak state of cybersecurity cuts across many industries, and CRM systems are equally vulnerable.

Mastering Data Masking: Key Strategies for Handling Large-Scale Data Volumes

Masking large volumes of data isn’t just a bigger version of small-scale masking—it’s exponentially more complex. High-volume data masking introduces unique engineering challenges that demand careful balancing of performance, integration, accuracy, and infrastructure costs. In this blog, we’ll dive into the critical factors you must consider when choosing the right tool for large-scale data masking, helping you confidently navigate these complexities.

Threat Context Monthly: Executive intelligence briefing for September 2024

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from September.