Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Role of Continuous Penetration Testing in Cyber Resilience

In recent years, organizations have learned how crucial penetration testing is for enhancing cyber resilience. However, traditional penetration testing is insufficient in today’s dynamic threat landscape. Recent trends highlight the need for a more continuous and proactive approach to security testing, and continuous penetration testing is set to record huge growth over the next few years, both among large enterprises as well as SMEs.

Using Endpoint Detection and Response (EDR) in Mobile Defense

Endpoint detection and response (EDR) has been a standard method for securing on-premises devices for years. When combined with antivirus software, it’s proven an effective way to uncover threats before they can cause severe damage. However, the growth of smartphones and other mobile devices means more and more work is getting done outside of the office. Organizations can no longer rely on traditional EDR protections as millions more endpoints are now exposed to the threat of a cyber attack.

Falco vs. Sysdig OSS: Choosing the Right Tool for the Job

The open-source ecosystem is rich with tools that empower developers and security practitioners alike. Two standout projects are Sysdig OSS and Falco, both of which leverage deep system-level instrumentation to provide insights and enhance security. However, while they share a common foundation, they serve distinct purposes. This blog explores the strengths of Sysdig OSS and Falco, how they differ, and how they can complement each other.

Kernel DMA Protection Hardening to Secure Your Systems

Kernel Direct Memory Access (DMA) Protection is a security feature in Windows designed to prevent unauthorized access to memory by external peripherals. Kernel DMA Protection requires UEFI firmware support, and Virtualization-based Security (VBS) isn’t required. Kernel DMA Protection offers enhanced security measures for the system compared to the countermeasures against BitLocker DMA attacks, all while preserving the usability of external peripherals.

Network Forensics: Tracking, Investigating and Identifying Threats

This is one definition by the Infosec Institute but to explain it in simpler terms – Network Forensics is a process where we collect and analyze organizations’ traffic data to detect any potential cyberattack or investigate any cybercrime. You can think of network forensics analysis as putting up CCTV cameras on your network so in case of any data breach you can look at recorded data and track the root cause.

Building Powerful CrowdStrike Automations: Insights from Fal.Con 2024

This sentiment expressed by Fiverr’s VP of Business Technologies perfectly reflected the energy at the Fal.Con 2024 Torq booth and struck a chord with security teams using CrowdStrike’s powerful tools. Detection isn’t the problem — CrowdStrike excels at that. The challenge lies in automating what happens next.

Measuring AppSec success: Key KPIs that demonstrate value

In the software development industry, proactively securing the software development life cycle (SDLC) from cyber threats must always be a top priority. Taking a shift left approach addresses security early on so your development teams can spend more time innovating and less on dealing with vulnerabilities. But that’s just the beginning.

Loose AWS API keys: what's your real risk?

97% of enterprise leaders consider a well-executed API strategy critical in driving their organization's growth and protecting revenue streams, yet according to a recent study, 84% of security professionals reported API security incidents over the past year. In March, a GitHub breach exposed nearly 13 million API secrets that users had left in the repository over time, severely impacting customer trust and causing reputational damage.

Unlock The Power of Streamlined, Secure Storage with 11:11 Systems

Modern businesses, regardless of size or industry, require storage solutions that are cost-effective, secure, and scalable. However, as data volumes continue to grow at an unprecedented pace, managing secure storage without compromising quality or incurring excessive costs becomes a daunting challenge. Fortunately, 11:11 Systems now has a unique solution for your modern storage needs.