Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top 5 Scam Techniques: What You Need to Know

Scammers are increasingly resourceful when coming up with scam techniques. But they often rely on long-standing persuasion techniques for the scam to work. So, you may hear about a new scam that uses a novel narrative, but there is a good chance that the scam relies on proven scam techniques once the narrative is stripped away. These scam techniques often exploit our characteristics and heuristics, or things that make us human and fallible.

NIST Supply Chain Security Guidance for CI/CD Environments

A CI/CD environment provides a foundation for the software delivery process by giving the ability to be deployed more quickly and without interruption. This notion, which is being automated and integrated, focuses on the CI/CD process. CI or continuous integration methodology, in other words, includes developers committing small changes to their code which gets authenticated, built, tested, and merged together to a common code repository, occurring on a constant basis.

Azure Security Best Practices & Cloud Security Checklist for Secure Cloud Storage

Over 1 billion entrepreneurs are using Microsoft Azure worldwide, and the number is constantly increasing. However, significant power or advantage comes with great responsibility, especially when it comes to protecting sensitive information stored in the cloud. As technologies evolve, so do the threats to data security. Cybercriminals constantly refine their tactics, making it imperative for businesses to fortify their defenses. So, how to combat with such activities? This blog will help!

Annual Ransomware Payments Surpass $1 Billion

For the first time, analysis of ransomware payments made in a single year tops $1,000,000,000. This signals a massive return to more frequent, sophisticated, and successful attacks. Each year, blockchain analysis company, Chainalysis, reports on ransomware payments based on the payments made to digital wallets known to belong to cybercriminals and cybercriminal gangs.

Container Drift Detection with Falco

DIE is the notion that an immutable workload should not change during runtime; therefore, any observed change is potentially evident of malicious activity, also commonly referred to as Drift. Container Drift Detection provides an easy way to prevent attacks at runtime by simply following security best practices of immutability and ensuring containers aren’t modified after deployment in production.

The endpoint evolution - Evolving from traditional endpoints to cloud or containerized workloads and the security solutions to protect them

As organizations grow and more endpoints are added across the enterprise, they create an increasingly broad attack surface sophisticated attackers are looking to compromise. According to the 2019 Endpoint Security Trends Report 70% of breaches originate at the endpoint¹. That is likely because endpoints typically represent the Intersection between humans and machines creating vulnerable points of entry for cybercriminals. This is why it is increasingly important to secure your endpoints.

The Billion Dollar Cost of Cybercrime: Lessons from the LockBit Takedown

The recent LockBit group take down has shown the world at large the cost of cybercrime. Initially it was reported that just over $100 million had been gathered through the nefarious acts of this particular group but, as I suspected, that initial figure was just a drop in the ocean. It turns out that the real figure was in excess of $1 billion dollars over the last four years, and I still suspect this may be more.

Why Machine Identities Are Essential Strands in Your Zero Trust Strategy

Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear the very fabric of Zero Trust that protects your organization from bad actors. As a quick refresher, Zero Trust operates on the principle that no entity inside or outside the network perimeter is trusted by default. As we usher in an era where the traditional network perimeter has dissolved due to cloud services, remote work and mobile access, the necessity for Zero Trust becomes even more pronounced.