Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

LogSentinel Received an Award for "Most Reliable Vendor of the Year" 2022

22nd June 2022 Balchik, Bulgaria – LogSentinel received an award for “Most reliable vendor of the year” at this year’s biggest cybersecurity conference, hosted in Balchik, and organized by Computer2000, LogSentinel’s official reseller for the CEE area. LogSentinel presented “The Power of XDR, Staying Ahead of the Curve”. In the presentation, prof.

Authenticating legacy apps with a reverse proxy

When we think of “authentication” for our applications, most of us think of user registration, a login form, and resetting passwords. Our concerns begin and end there. But as we dive deeper and our security and compliance requirements change over time, we have to consider new password hashing algorithms, blocking bots, multi-factor authentication, and external identity providers. What started as a clear, concise set of requirements became an ever-growing list.

The Current State of Intelligent Automation Adoption in Cybersecurity

In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key security and IR processes, while another 85% plan on automating them in the next 12 months. Despite the positivity of these statistics, many organizations struggle to change to a more automated process. This was highlighted at a recent webinar we held with a panel of senior cybersecurity experts from a multitude of sectors.

Kroll named as a winner at SC Awards Europe 2022

Kroll Responder MDR has been recognised as the Best Managed Security Service at the SC Awards 2022. The results were announced at the awards’ first live celebration in three years, at a ceremony held at the London Marriott, Grosvenor Square. We were also finalists in the Best Incident Response Solution category. The SC Awards celebrate the cyber security products and services that continue to stand out from the crowd and exceed customer expectations.

Interactive Phishing Mark II: Messenger Chatbot Leveraged in a New Facebook-Themed Spam

Facebook Messenger is one of the most popular messaging platforms in the world, amassing 988 million monthly active users as of January 2022, according to Statista. One important feature of this platform is Messenger’s bot. Within the current digital landscape, chatbots are widely used by companies and individuals to connect with their customers online, and almost immediately pops up when chatting with brands or businesses.

5 reasons why Sysdig partners with Proofpoint to enhance cloud security

At Sysdig, we are constantly looking for ways to improve the security posture of the organizations that we work with. One of the areas we continuously improve upon is our platform’s threat intelligence and detection capabilities that leverage the open-source Falco project. We incorporate threat intelligence sourced from our own strategically placed honeypots, data collection systems, and multiple other open-source feeds.

Preventing container runtime attacks with Sysdig's Drift Control

Containers revolutionized how we build, deploy, and run applications with increased speed, agility, and scalability. But, as often happens with transformative technologies, they require an evolution to security strategy. Centralized deployments inside a protected perimeter gave way to continuous and distributed deployment of containers, creating a growing, dynamic, and distributed attack surface. IT and security teams were left blind and exposed in the cloud.

New Netskope Customer, United States Patent and Trademark Office (USPTO), Leads the Way in Security Modernization with First Ever US Federal Civilian SASE Contract

Today, Netskope announced it has been awarded, through SEWP Prime Anacapa Micro and distributor Merlin Cyber, the industry’s first Secure Access Service Edge (SASE) U.S. Federal Civilian Government contract in history, led by the United States Patent and Trademark Office (USPTO). This is a significant industry milestone as traditional, perimeter-based approaches to security will no longer work in a mandated cloud-first environment where data can be accessed from anywhere.

What is the ICT Supply Chain? Things Your Business Needs to Know

Cyber attacks and data breaches are top of mind for businesses around the world as attacks on vulnerable networks persist. It is more important than ever to ensure cyber security and resilience programs are in place for your business and third-party suppliers. The information and communications technology (ICT) supply chain is a globally-interconnected ecosystem that involves CT software, hardware, and services including suppliers, vendors, and contractors.