Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cybersecurity in iGaming: How to Protect Your Business from Cybercrime

When the American heist comedy Ocean’s Eleven was released on Friday, December 7, 2001, it topped the box-office draw for that weekend. The story follows two friends who plan to steal $160 million from three major casinos in Las Vegas. Entertainment Weekly called it “the most winning robbery sequence of the decade”.

Keeper vs Bitwarden: A Side-by-Side Comparison

Keeper Security and Bitwarden are password management solutions offering varying user features and benefits to their customers. Bitwarden is a good password manager with a password generator tool, autofill, two-factor authentication and more. Keeper is an enterprise solution that offers these same capabilities and more—combining a password manager with secrets management and connection management.

CVE-2022-31656 - Critical Authentication Bypass Vulnerability in Multiple VMware Products

On Tuesday, August 2, 2022, VMware disclosed a critical-severity authentication bypass vulnerability (CVE-2022-31656) impacting multiple VMware products, including VMware’s Workspace ONE Access, Identity Manager (vIDM), and vRealize automation. If successfully exploited, the vulnerability could allow a threat actor with network access to the user interface to obtain administrative access without needing to authenticate.

The Importance of a Machine Learning-Based Source Code Classifier

This is the fifth in a series of articles focused on AI/ML. Source code is a critical part of an organization’s intellectual property and digital assets. As more and more centralized source code repositories are moving to the cloud, it is imperative for organizations to use the right security tools to safeguard their source code.

Driving quantified success with Elastic Security

Insights from the 2022 Results That Matter study “88% of boards regard cybersecurity as a business risk rather than solely a technical IT problem.”1 Regardless of geography, industry, sector, or use cases, most would agree that reducing risk is a top priority for their organization. Whether it’s decreasing phishing scams, ransomware, and malware attacks or reducing the risk of customer churn due to breaches, security is everyone’s concern.

How to Rebrand 'Bossware' at Your Company

Gone are the days where bosses could simply walk by an employee’s desk and peek at their computer screen to see if they were on task. At the end of last year, 45% of full-time employees worked from home at least part of the time, and many want to keep it that way. Enter employee monitoring, not-so-affectionally known as “bossware.” It’s software that companies install to better understand what it is their employees are doing all day.

AWS re:Inforce 2022 recap

If you’re looking to catch up on what happened at this years AWS re:Inforce, this is the blog for you. There were many important announcements were this year, including some exciting updates on the cloud security front. In this post, we’ll quickly review the goals of the conference and who should attend, before diving into the keynote highlights, software updates, and helpful resources.

Identity Theft: 5 Different Types & How to Protect Yourself

Identity theft is a serious problem that can have a lasting impact on your life. If your identity is stolen, it can be used to open new accounts, make purchases, and commit other crimes. The impact of identity theft can be devastating, but there are steps you can take to protect yourself. In this post, we'll discuss what identity theft is and how you can prevent it from happening.

Improving CrowdStrike Falcon Detection Content with the Gap Analysis Team

CrowdStrike is always looking for innovative ways to improve detection content for our customers. We believe a multifaceted approach that combines customer input, standardized testing and internal research is necessary to stop breaches today and in the future. At CrowdStrike, we never rest, because neither does the adversary.