Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Efficient Endpoint Management for Better Security

Endpoint management is a key part of keeping businesses safe from cyber dangers that are getting worse. Every device on your network, from computers to smartphones, is an endpoint. This means that hackers have a lot more places they can attack. Endpoint control that works well is not only a strategic must, but also a key part of strong cybersecurity.

4 Security Controls Keeping Up with the Evolution of IT Environments

The rapid adoption of cloud technology in the past few years has transformed IT environments, enabling unprecedented opportunities for flexibility, scalability, and collaboration. However, this transformation has introduced a potentially dangerous level of complexity into these environments – recent research from PwC revealed that 75% of executives report too much complexity in their organizations, leading to ‘concerning’ cyber and privacy risks.

The State of Security in 2024: The Fortra Experts Take a Look

At Fortra, we like to encourage a collaborative environment. One of the ways we bring our community together is through our Transformer meetups which aim to provide a positive, energizing, and fun hub for all Fortra employees to learn how to be innovative, get inspired by others, and reach their creative potential. Our most recent meetup was moderated by myself and our panelists were Tyler Reguly, John Wilson, Bob Erdman, and Nathan Ramaker.

The Pack Looks Back: A 2024 Year in Review

It’s the holiday season, and as we close out the year, I’ve never been more confident in the people and mission that fuel Arctic Wolf. A year ago, we set a goal to be even bolder in our commitment to define the security operations industry, while maintaining the qualities that make us great: our community, our perseverance, and our willingness to go above and beyond to delight our customers.

CrowdStrike Falcon Next-Gen SIEM's First Year Transforming the SOC

There are rare moments when technology doesn’t just improve — it leaps forward, leaving behind everything we once thought was enough. The launch of CrowdStrike Falcon Next-Gen SIEM was one of those moments. It’s a game-changer that alters the way security teams think, operate and stop breaches.

Top Open Source API Security Tools

The modern world relies on Application Programming Interfaces (APIs). They allow applications to communicate with each other, servers, and consumers to facilitate data sharing and simplify application development. Without them, the internet would be unrecognizable. However, APIs also present a considerable risk to organizations. If left unsecured, they can be a gateway for attackers to access critical data and services. Protecting APIs is extraordinarily important, but it can be expensive.

What Is Loyalty Program Fraud and 5 Ways to Prevent It

Loyalty programs are so ubiquitous today that most of us would be hard-pressed to count how many we’ve signed up for. Earning a complimentary service or item is always a friendly reminder that you are valued as a client. However, that warm feeling could quickly change when you find that not only was the freebie already redeemed by someone else, but all your account details have been compromised. At that point, you will likely not have any warm feelings left towards that brand.

Grinch Bots strike again: defending your holidays from cyber threats

Back in 2021, we covered the antics of Grinch Bots and how the combination of proposed regulation and technology could prevent these malicious programs from stealing holiday cheer. Fast-forward to 2024 — the Stop Grinch Bots Act of 2021 has not passed, and bots are more active and powerful than ever, leaving businesses to fend off increasingly sophisticated attacks on their own.

The Hidden Cost of Web Pixels - A Privacy and Security Nightmare

Hey everyone, let’s talk about something we all encounter every day on the internet: web pixels. You might know them as tracking pixels or pixel tags. These tiny snippets of code, often invisible to the naked eye, are embedded in websites and emails. They might seem harmless, but they can have big consequences for your company’s privacy and security.

Top 12 Container Scanning Tools for 2025

Kubernetes is a revolutionary technology for orchestrating containerized applications, enabling organizations to deploy and manage applications efficiently. Containers’ portability, scalability, and agility have transformed software development and deployment. However, these benefits come with significant security challenges, including risks associated with vulnerabilities in container images and potential misconfigurations.