Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Quickly access insights about apex domains on the attack surface

In a previous update, we highlighted the improved navigation to the attack surface. Improving the navigation to the attack surface ensures Surface Monitoring users can easily access critical information about their exposed assets, such as attack surface state, their DNS footprint, and open ports. When a user accesses the attack surface, they have the option to view their root assets (often the apex domains) via the Root Assets tab.

Why XDR Must Start with EDR: Join the Discussion with CrowdStrike and Guest Forrester Research

In the cybersecurity industry, understanding the value and impact of the critical technology we use to keep organizations safe can often become lost in translation. This is undoubtedly the case with extended detection and response (XDR), where the continued misuse of the term has created more market confusion than clarity. The definition of XDR varies depending on who you ask.

Looking for a Digital Forensics Expert Witness? Guidelines and Procedures for Testimony

In 2022, a lot of crime involves a digital element. The digital element can be anything from text messages to complex cyber attacks on organizational networks. If you're prosecuting, a digital forensics expert can help you build a stronger case by gathering and documenting evidence and testifying in court on their findings.

An Inside Look at How to Keep Open Source Software Dependencies Up-to-Date and Secure

Today, open source software provides the foundation for the vast majority of applications across all industries, and software development has slowly moved toward software assembling. Because of this change in the way we deliver the software, new attack surfaces have evolved and software security is facing new challenges inherent with dependency on open source software.

Continued leadership in open and transparent security

Elastic Security has long been open — with open source roots, open development, and the release of our SIEM in 2019. In 2020, we further embraced the openness of Elastic and released our open detection-rules repo to collaborate with our users and be transparent about how we protect customers. That repo is focused on our SIEM and Security Analytics use cases and did not yet include Elastic Endpoint Security artifacts.

Rubrik Named a Leader in the 2022 Gartner Magic Quadrant for Enterprise Backup and Recovery Software Solutions

Assume breach and recover faster Protect your data from the inevitable Recover safely, quickly, and precisely Assume breach and recover faster Register Now The need for data security has never been more critical as ransomware is the biggest threat to our economy and our digital lives.

What Is a Password Vault and How Does it Work?

A password vault is an encrypted digital web vault that stores online login credentials, documents, images and other sensitive information. A password vault gives customers the option to use a single master password that decrypts the vault and provides access to different passwords used for various websites or services.

Vodafone Bundles Lookout with Google Workspace to Protect Small Businesses

Even before working from anywhere became the norm, organizations of every size were already becoming more reliant on mobile devices and productivity apps. But this reliance has also opened users, devices and data up to more risk. This is why we are thrilled to see our friends at Vodafone offering a new bundle for small businesses that brings together Lookout for Small Business mobile security and Google Workspace, a suite of collaboration and productivity apps by Google.